Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
ea7b052cc271e9b46546a38723a2839d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7b052cc271e9b46546a38723a2839d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7b052cc271e9b46546a38723a2839d_JaffaCakes118.html
-
Size
189KB
-
MD5
ea7b052cc271e9b46546a38723a2839d
-
SHA1
c75151b1f0118b23e397f996b0073fd7eebc7b74
-
SHA256
b562e285bc65c77ceeae7b528d53f92211f693274402d377d49e675262766cf2
-
SHA512
e03057335dc3427737334cc0d467e9ad53dccafffe589f3d01c6f1d0913f7b420545defdc63521fdad1406b5527dbcf566446264b43b93ac3c0b41dc864d16ea
-
SSDEEP
3072:SRtueZByfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:SResMYod+X3oI+YS1tA8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432877516" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000003c354b96c060368f8e98f5912b5b6b1713b8fe300f0f2bea4fbb5bd345aafec0000000000e800000000200002000000032863edc4eb6b69f072416def275e72660edc2b623b7138619a5131029a8be4920000000c365a702aa01c00b9f9ea44558b39a09a043c042a4f0b3a8b73a74157310b1be4000000051fed8637dea50238a3ce9ba3a165d0c29d00cd03fed53e5b06c20b077de720bdfc9c87dde49fc2c57a78f8d1a224284689cb795430f16b02368bdca720426bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C8ADB21-7635-11EF-8EB4-4E0B11BE40FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f74711420adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1568 iexplore.exe 1568 iexplore.exe 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1828 1568 iexplore.exe 30 PID 1568 wrote to memory of 1828 1568 iexplore.exe 30 PID 1568 wrote to memory of 1828 1568 iexplore.exe 30 PID 1568 wrote to memory of 1828 1568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7b052cc271e9b46546a38723a2839d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5428b19c0b8a55ba5eb9d87fd9e48b538
SHA1e8c781dd14b5a0da6d910dbe4f2adc393656d0f1
SHA25613563c4d0abb347bed3dfe360473974fb2cafd2c3769701b71c23fd81fa64b80
SHA512c086679bf9d8cb07ed2ba155dd1491e2390dc4fd26bc93b24df896f20c7d2b371f8c02ea48fc996f661a79432efd70d1f2420caef199a0501c810715871f08d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519136ac83a23cd229bd6c194803d3781
SHA1b214e7a8de0875705f0b6eeea82984505a97040e
SHA256469a6d61a2c6cc37bfb801257f762a7b899ff1a9dfe93ff2de0323d411882356
SHA512f12427127ca01ea3414cf853ec1686fac9fa05773be7a13ee027384a66e24f84806e1b77ab5a77684a250878526382b5c4023792ced81b79a6e731ec4899c7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6773d5b5346f5804fc142705b3de188
SHA185cfb0ca48a0931a91bc1793f9d6e3d07593d68f
SHA2562c469ddcfa43e20bd814181ccae46ee2e71e9d472429dfe158f1cba0296ccede
SHA512d3212faeb9dedbaa5ac77e148f41329869c3017ed564c9d73dc45b9dc13b4ae9531d7c4ff682f2d3e72f74e5b71ec3b3d43a583776601706dfda3a3b1064f76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102fb6d2f11092939f5f67f76c4d7695
SHA1a0adc8c0bf98ed8b75955873fa0af55743179462
SHA25641bd061e6edd387c8e256628ad9e50ea01d61a4860932ce316b58ac7710136eb
SHA5122af6857960d125aa52477a5de958ba0ae58a0447234298aa41b7750eaac64e4194734b1db00f016115e832c32e20902973203e42737fe0b9fe78f2f1d77a5a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f636a524d0c716a8676ef2e6c626dc0
SHA173bf02b64f6c911cdda54fc401f64c6b85712ffa
SHA2563b2bcdb1bfd66e0f0705905ffa96c8a986297993d6dec61883f02449925e47d4
SHA51247018dac496964f2d79333cb86c83bd9fe9edfaf975cf229d428eb4c02b46d9f4e14df09a2fe33c89119be85320e6da66a9bf636e2358501fa5f05b5ae3d2871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6c9dbdb0bffff72170a1e3613a7a19
SHA14e93cf9ea6ed49ffdbc4a476b28f994a0782290a
SHA256613c2014681821deccd81c57a7398befb2567191a25288c917e5513d4ca450d9
SHA51270154319fc6bae02d4627a77c9b26ebab46fedf997521cd50713cde3884e2d542e31118acf47a7cab81f4f2737f6dec2ca96ecf7b8ff9b572462acc8b8002e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522202b11130b3192b23f85ab0004e37d
SHA12845436e095be2a2aa867b3087201632e1f81ada
SHA2561f66586674470d80efdd74c968b0a93eb9593bcf0200a92f3d7d8b80bfe72a62
SHA512005132e25959e945be4e095ceb24d0a9a049e7d1dd1bc07a82dfc55e4a9a84e3fe3a35cb976ee2fdc3241addc6e782d696063a22893c4d7eaa6ebc1ffc0624a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abf1be175a9fa76f0b84d93964c4c55
SHA13e26d79d366c284b940547e55367ae5e493f2155
SHA256031f4afce8a6fac3216121b7e71bfced1b1cb21434f95c5aaad6f0d1d9c8cb59
SHA512814d172b0218907f93234b14fa228b2e18db1fd658eb14ff8bfa23c0693b6f2b5237ce7380be89b73b743e6ad5bae9d9780b4f600014601347e35c704af7a872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5535730ea8ea9ca0cc1a408d6b3fe59c7
SHA16896599fe716d5a547219f1cb685315be099fe66
SHA25642a58bd67a1ee32adf455bec4a6a6be16970269d8f8f434187d78ddc67687b8a
SHA512a75b3799f0498894b81cd8f64386992ebd1199bc6224f11dbb29d4786ef0fbe0f5d301a0b5c7d46897aed9431e33d13c56cdfdef46f5e2a1594d8f7495fb4f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52819ad90ce689fb13745e9cd68b15d2e
SHA16ec78c5fdb357a3c838bbfcd7b551039be7e6804
SHA256c868f1be88ebcae333ede3393bed47d11f3ab19520394aa71c775e068fcf747a
SHA512673c0b1c1d2260e8e7a580b5ce84fd25fbfb9015c03caf100d4900a03230d6edea59fa77461ece322a3492f00414bb1a8a7a7a7a332c02b47218e1e151e2ff1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4a9f9fda99f912ad56513459dfc12e
SHA110c8a2f07f8a285488780b04ef7b902382caae1c
SHA256354d4a69cc5f5664f2310ab9ca1512d8e2bba620eec6977b82113cb617df7e67
SHA512fb32484d0edbedc18f8115cf8e58d54ab8d964465072544895039a6b5c09f7736d2c475d9d10dc999b8f67bc5d6b2ec7852b739342a884ee1c481448375d0f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363ee557f7a31981fa17c60761488b8d
SHA1c05a98d03de8ce55c0de37ca2ffe1705a54e62d2
SHA256b6a9d1dc0a9a5808f426f2e2aff73223b7a0df3c9d3a85f012a7d7bba0457413
SHA5123b9fd82ed8f8863173140cd63ee761bddf988d53c0b5573036198b3177b2c7adee8fef01cc41dc54d7f221bc7c25c907529aaff65036bf06d5d39964168fec7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5920d675b99138975f6929bd63011922a
SHA15f2d7329e720d4162a56b76d393cccda6d9ba097
SHA256ab198ad74cd822e008d42ac79fb44e709a07352936960006299e214d17551701
SHA51257b2de8091e019e82503a89d25824e19e77b7925dc5bbf488a2f8a2a0fa315c33d5b01af746dee1b541526063b1d58bb39b7efac49d413f1b846772c430c38af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50071bc63a639569f3fabf2fae1716354
SHA1ff895c14b36267673aeee6c11bf832f3b9dc5007
SHA256eabcf88da811b836ada35d2148cba14f6514f6083780bdff76a38a0c5717bea1
SHA512025634d8375e6292d2f5b09301d969347d662c90efccd5ac3b7561291cfc46bbb2e9ff30e169110181ce4efed5db255b19a8be5efcf6700bc0c7fb6189504808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726fa4ebddb0da75865a6419921e0fda
SHA1b5a9d1dc49e1ddd104e4ae853747c632cb4480e8
SHA25615c62d01141b753cc82d05348a99dd46a59d325077b863160308a218146f7ce7
SHA51261e45c02f621e4f29ad5e1dc74a9f2864417e3561938265682d34d9dc60fc1884aa5ce0a3e99be84af0b61fcdf5710b1c329aeb682f9c1d6c21d0c5253552e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b23d35eef50bac668739bd0a3537ed
SHA1b3a4ef3d7cc83b558008b4cbd4d497b788c9809b
SHA2562df5cf45ee25ad6c480316ddff1775e1b68dc34fd322e3de7c2aa657aa9cc187
SHA512c260fc7420e965f5b628d121bd04873fe542b5dd6ea8b9f1ea38f8025e3310a6787e29c6c0722457b7989e178f45aca9cebb7f146e9c713eddef289b99c844c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa957e5ee4c83b5a889c4bf8d1ca6554
SHA14259b6a9b07c12c67b4a28a3c974dfcbbe434e12
SHA25631f5890275b70b374f0a22db0c1f1b4c23d2d3c1316f13e3b41c4a9027d9d17f
SHA51217c75591b74eb522ec249c70f24180a0c3fd8cbd35623ba9b361a9569f89bc514cf9ee86594617597ea544b28436cec1bea1664af1b59c9e232b3eede8e9017b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874af17df7574fb039c6684e78340078
SHA1824c2de80d88ace42e02da9352af3086b0480486
SHA25663038df1c87a56513c02bda3891cb580fd0097221d717276c5959dadb44bd7dd
SHA5127bf481d74b17c2afe2c7afda901af33cfeefd383e866acbd09de36f1c481bbd9c6e14307c9f90ed2073f69634ab5687fc798712b7ca722167cc969f764f95a50
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b