Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
ea7c15eff4bf3f6ba2b6a8d938c8ab56_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea7c15eff4bf3f6ba2b6a8d938c8ab56_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7c15eff4bf3f6ba2b6a8d938c8ab56_JaffaCakes118.html
-
Size
9KB
-
MD5
ea7c15eff4bf3f6ba2b6a8d938c8ab56
-
SHA1
8b422ad7c8edf20a2c042ea47f60b5c3eaa7da29
-
SHA256
153a96d5dce9eff806fdefa75b9a66f8f35fb6b39820a1747e20154a393d216a
-
SHA512
8d6081f45bdd7ec3ccf34f5b40b7e65b8879fb642290aa85b115b057830f2c34444c96fd670f58e071f5255f71bc1c86a11a5b91d1bf9dfd77f40b38ab15fa0f
-
SSDEEP
96:tYrkAg2guGkQV89xZWvAdaZLtX9+Psbsc5NLcFnw4FVH89fDfFBFdE182ZXEWMIW:YkAgEtafRwyjc182hWzJQqagWCp/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432877718" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000003eee082bdc3662d5e85f0a563ed2d560f89693eb1f214e403618f75ee11f3d8000000000e80000000020000200000000ae8c8f24b24dbd0aeb3fc42a1cc6d72d701cac1d32a4daee1852b362c4e850d2000000066cafefe681816230850bcf18cfe11d20722ea835d7b30e57ceb9dae112a0cda400000001f87e0889364ad30cd5ae194b2cf2fdc0161a70f655f95e3e148290d0c70b77b3759f678d2e04a1594075afed60e29c78d7aaa4c1c3354372b6f9b7ebec049ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B298B031-7635-11EF-AF9A-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f1d08a420adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2068 1820 iexplore.exe 30 PID 1820 wrote to memory of 2068 1820 iexplore.exe 30 PID 1820 wrote to memory of 2068 1820 iexplore.exe 30 PID 1820 wrote to memory of 2068 1820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7c15eff4bf3f6ba2b6a8d938c8ab56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bc62c38508b307a7ba878fe5934ec085
SHA1ce9f55cfe16c04b12dfff82131f892f762655c65
SHA256299f1a77753f8d3704b1f20605381545e5f4ca21331f9bbec5f3a54c3a821367
SHA51222d58b46570edbd9d5f2313e20034425eb9ffb590d4f1df21ce4dd8b3a329cc9d5f403b5ccb80521ce9720861f6973b16d1588c48d1c0fa048ab3e700583b480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a13981f036cef9a1c06805c7a7a31b2
SHA1dbd3257ed1e55b2397a19f6dce0e8c2ce33e8c4d
SHA256bc82be78b9499f8ae6dce6fc01a9d326ed20bda1681dfdd62d13ac3c1ea1002e
SHA5127081cc6157925334864101a05221d01db10747dbf3a8f9cb782d61b7d8cc16d74569745c38fcbcde7c3d877fdba3cee82a6f63585cc6f59d1e5e13efca354b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534cb442b015974030806ec4636441ca5
SHA1276f4296b24c619c9a19664a0a9d9677e1b5f318
SHA2563e851ff34dd9ed0794bae7ac75f0dfda378151044422f91f2e09d568e0cc210d
SHA512077f19f90c5c4448e5abc5061f3057f33882c3ef4a7fa6f28190767f39905d2035eeff7c41e141d5410bfe7dbf64b41159a608016808649378e0609db9620d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc92c432b01ee020bf77b1a057dc02e9
SHA17b1d78c53945e92c1b697bf035a67bed133dfdf4
SHA25655ed9d0b8664aaf5200344a206bea0f49713c8d9c4b3b3418daedd0a09893f72
SHA512a1394faa65d71ad52dca57937e2b365e3b0c2ea180a5a4ed3b915ceea2bfefce8854c235674bccfc00db8a8d09bb631a05af940e1df851fdf31585f49c29ac07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e82c8285c5818adc5f1e28a479b0af
SHA1b28a3b09a884961c1878902893747b9bd6eca535
SHA25662500bb172c9511dcabf44c5e3750bd3cacc78cc6ae5eaba93cf83b0f39f01b0
SHA5122bb1afea0578b678e8cd65b5e9c0cec2c66f16ccf0be279077ccfa65162e10fd76331f2fa3ec7444f99430d0d4e0df50f023c9a2b5b7fe9dc22b95ef1d9731fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c90ebc9caa95c4fa339f28cc37e995
SHA15b1b7a4a6e3b5a8a56981b4c269a66f0e7eafae9
SHA2561c9156e98aeb6234eadcede9668b5be2d8cd6fe08f0138f7a83475842a703fcc
SHA512585adcc79255d64f87e73283d62d507d18d0d2006145ee14cbb79b07e811ad736f354d704118e31f1f8112de0eaac421ac0ea2104deec3b7de5a5ad3ce5f13e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa358f7535e7f071d13799ed5439747
SHA172b6c133ff76f58d1bb8dae9087a81175d4305e1
SHA256f1ef116de908f6ff80d8265122492a38409ae47845a15f8b5b9a83454aa1e5b7
SHA512467f60de04f12266485b9d2f2c2a8153a31917230ee83e9d7b34a2bb53fb52a10016d301e1c48b6b802c60fd5976c2bd1d3515d25ed8e1603f0920959d018fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c0b46bc1c3e62f734fe1e9d8c25715
SHA107dfde0d95eecd77e49815bee07886ba027f79bf
SHA256b515420dedf4024868ec4f90a3136276fdadeb05f2a5f08b26119db8477905d0
SHA512df3a59809c4d5f9f3080fac4957f8de167af472ba83ee28f94dc605450152f024c5929a23d103234ae51a9c16b3ce0d920817177a279cf983d4b23b317b802e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD526789e46bb48a730e8439e88a5b8f0f5
SHA1b9dc44fd02f1eafced93ebb572c08ade54b322a6
SHA256c2c9329e07a6a30e4e2782e0af6685a0b94eee2c158ae47acb4dfbb3337f28d0
SHA512b834dbba514e7e205e527a677e50b17bd2f1e4a0708ba1d520c5849b32e814f134ef2b667c1a21df0790a7c3602605b26b8a0c22cb091138793c69eac32ab657
-
Filesize
99B
MD56b036266f6da4c52eed33ae402362f3a
SHA108a5362c493978d2b1c3046c5a3833bf3a2d9e9b
SHA2562489e081fdb70e6ce0e7044cc8c983d4347b4c43c4267b3b49ee40c5ab3a835f
SHA512054b1e4704a7c3f8c0671ffef338168bf6b6069bfcbcc2bc4bafd5be50cf2fcf9187fd2fac0b738de38651eedf63543b274ed341fd3fd50e4eb5a60aa067f39f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\styles__ltr[1].css
Filesize55KB
MD54adccf70587477c74e2fcd636e4ec895
SHA1af63034901c98e2d93faa7737f9c8f52e302d88b
SHA2560e04cd9eec042868e190cbdabf2f8f0c7172dcc54ab87eb616eca14258307b4d
SHA512d3f071c0a0aa7f2d3b8e584c67d4a1adf1a9a99595cffc204bf43b99f5b19c4b98cec8b31e65a46c01509fc7af8787bd7839299a683d028e388fdc4ded678cb3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\recaptcha__en[1].js
Filesize537KB
MD5c7be68088b0a823f1a4c1f77c702d1b4
SHA105d42d754afd21681c0e815799b88fbe1fbabf4e
SHA2564943e91f7f53318d481ca07297395abbc52541c2be55d7276ecda152cd7ad9c3
SHA512cb76505845e7fc0988ade0598e6ea80636713e20209e1260ee4413423b45235f57cb0a33fca7baf223e829835cb76a52244c3197e4c0c166dad9b946b9285222
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b