Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:16
Static task
static1
Behavioral task
behavioral1
Sample
ea7bd60d4f2d2cab2794ffa9e4407f0b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7bd60d4f2d2cab2794ffa9e4407f0b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7bd60d4f2d2cab2794ffa9e4407f0b_JaffaCakes118.html
-
Size
27KB
-
MD5
ea7bd60d4f2d2cab2794ffa9e4407f0b
-
SHA1
e101cb9f56d1986dcabb64c982d24860bfd69316
-
SHA256
411e54892c9742ca337b2328a02798a020c0be826dd3169306babcb5d29b1e86
-
SHA512
9d52f911b97382a47369a4c3f3f2fa223b405562c8815c1718354b794a0965bdd8d270e1f0608704ffc439ced1972959b2e5e66ac51d56336c8d094efc327ca1
-
SSDEEP
384:x53H8mf53H8mf53H8mKZfQvP4jJPt7WwsWwqj+WwfTZ:x538W538W538lYP4jJPFWwsWwqj+Wwf9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80786f6e420adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000193236772c0d7eb64a47149f1059970805de6e60e9fce304fd1100e299d822b8000000000e8000000002000020000000dbd78450ad5f42397a267a70a7ee7881ba209ae33e8d80a58f231c774b81a6d72000000000d7fdb6029152639a6906cfef03a3653c08b1cb34643f1f15760f796bcf1dc4400000008b253e884f6cde78820e055b25de94a061880e0a0777c7c3ac6bb2f7912e76bde9da93df2925752fc4f9e0d4f0c8bc64f2b70cb99a380f8b271e8155234356aa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432877668" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{972C0721-7635-11EF-97FC-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 816 iexplore.exe 816 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 2764 816 iexplore.exe 31 PID 816 wrote to memory of 2764 816 iexplore.exe 31 PID 816 wrote to memory of 2764 816 iexplore.exe 31 PID 816 wrote to memory of 2764 816 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7bd60d4f2d2cab2794ffa9e4407f0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:816 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afcad78226258589680d8f16d83d0c50
SHA129a1f7b875753c7e7d29ccbb87f562e0b45f4c12
SHA256d0f755904f99ed40e5d2eefc72c44e21841b46e29e6f4fa2554f4d1fb2187de0
SHA512d639e098b9a913ad1d28f118eccf5ce543f11a5b5015a00c0dc04959703e3b57893b74f7e6a029adc1139981d34077e9827a23297fb68c3027ffe9fe0f30d18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561e6e833f3eca0c8526d1130cc50822
SHA1ac0074c652609cf92270a6bf564c367c968ae203
SHA256dca6cb70dfe743e8cbd915bfcc531da74633c362db11e28e4c1e054689f9020a
SHA512e64938fa7d93a3c4e028192566648072313624d857c111fd2b81c6ee304fd8b1ee478987d18c8f8129d58f85e8d340c1cdae16a36b83bb75ad0db92871731ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5545a693962d38b5b75e6f2886535be05
SHA1dd7ae436bf66df7adbbb4d901813a332d7901198
SHA256d49293617b022f962958c17bb9bc7dd1ea1c5ac3fc93c51ff55eb071ab2b3ec2
SHA5128113dadf7846482194463bd000fbce5d0ba182a6ed52576a1601590a23d1e362b782cacc24798c7214d469b1f36722db67a781db4dcf3a180bad6ebf0a7a975d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066311b22a2fbe5d0313478b657218a5
SHA131a6a4350705080a0ddc9e5278d7c980fd133435
SHA256353dc605b6965f574b85ee2b920be52dc906897ade29e2de452b397ed8b35fb6
SHA512b7e71777bef7e2769e35fed473b04038fdd7634ea1ebe6a70534e93c14c76ee96b23cfb0051944d67b72a41f6eceaa5820cefb5c0f809169789f4e3f53164a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888384dfc438256609324b3e00908bff
SHA19f3d157e6d171567702aa08833e733b0513674cc
SHA256879eea42e0f2842770da92c7f308ccf5c4e49e644970ade7ca5e2981ac53c2b7
SHA5127eb0a518746eb12c3a306d6f241082ddf22c03719c7f2ef126342d08e0d7f3128c1c410a979bf1a37bcb178fa685af8388d1f239a4170c186cb5060054a63f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57649e38458be145a749c27269f1a8dca
SHA168b4deb33c9dd67e3fc169cbc01d2305362ced83
SHA256975531139ea18670eb227f247c33f64c23db04c3e283413ec815015e40407f07
SHA51268858f70e747e7195b346f2b93a4a88771f87323dff9a75f9503c3a7ccb92d9c60685dc879142aba2347aaae4464a2c319655addfb58ba8031ab94163dab74bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a9484662a5ec5b09d05db97ff0c856
SHA177db228d5b5064d18030ad7d940adfb0cf72f193
SHA25695636489da1503334b3ee80c3422613f0ff26d56e70a84b1dac65fda45dbbefc
SHA5120fdbfda27e4c6bb2778b1eb12a3d37adff53e307e819377e8080a053cce4bb3584535f89417a6d3ef39910220e6c2b6799943c8a16425322435d4c1e53fdd979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53421eb8ec34751dbbb7fa6f63bbf3b0d
SHA1c8c2ee9fc575e8f2c8a4312fdef1fb8d7a881df9
SHA2563ef7e7a3ad32b8a18d92c1ccdccbb9297fc713a389939270146c12df427cd13b
SHA5121faf75e522937cacaab7a98216387d0b6a008a98e6ae1a9a8b5ca9276aa585bc57427cf659ebc14055bad08909293c74b3cbac8dc7acc03801a909a13d2b8a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5c980cab0710a73d366bd88ca0512e
SHA1ee63486adfd09dadb21abe066d5d57e7396a6af7
SHA25634f97c1d46269e60d004166561e1558ecf7afc76c3ac579992fbd9900b579fd0
SHA5123a51a7fa2a129384978bc0c33e4645ec6159d40a9be6d3fe9d8e0a0b65db00f18de37253dd5814b05d5ffc4c1d0a4db1b7e5ef5705e1f8310b0c9d58378b23c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eabbf4296115593b4b6bc10951d0e9ba
SHA101af36caa4cc59e5ec95c9b3b0d3a26583b64ed9
SHA256619444503b439649703e3e802b4b90f601305e63c5d1564cedd9a2fc4dc57629
SHA5129c2efbcb93a943f3dcdafceaf635abff45aab5d0954f939ed6c5be85d0c6ca6061c7c1fc226683c4b31c2f8fde96299c44ab0ff58d73809bf02ff8162b7e8921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539b32df06a609a1d80c2ef090cc97331
SHA10f8f75c8b014e7b6abd662e853d1813084ad229f
SHA2560fdbbe8754bcfefb3ea2ca3aea38391626d01e2b089512982881a5288757185d
SHA512d85f1ef74e3dc857258e55153c7eb14e8239e4de5eba032178f04799f6abfae89efc867a32d4d27c26724da1a353e14f82e1db0c823c6b20b38750c750cf604e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ddc717d6c3f50dc5ba8dffeae85459c
SHA1b92f79bf79c11ddf357a859cb6bf2a10f87a14bb
SHA256091dda35d5f02de77e1728193d8e1d0519f03a187be11df0416223a7553582b5
SHA512f3dbb8151ff36d90a40e3ad471ccdd61a7df13a3d384a37719c19d167e9a739b5fe0428ca745322747f0e9df6c63e00a844f0a48cfcabdef7820248f50fe8f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a3fd9aeedf466d5023304c198e4868
SHA10690a87a4f4eed95d2a3a09c837b0ada3e3d89bc
SHA2563ac4c156125591fe023797e5bb9deb35dd07d43e8ef4e13c98b9d13b07b685d2
SHA512fccac610662e779a07d5ab0ee15cb424f7b8ff4ad8f4e8a70f4a6f95442cbacb94ec069463b1a61547cd043c62a42d2fe9387ec4fddcf9287e0dc485774e96e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78eeafaeea935bafab40ed48582236d
SHA1f2914cee532608b0840148e767aff0575973f7bb
SHA256d5600a65c83d1aef4820560901d16c8979ccb21636da2105cd8c0acfb407a200
SHA5121820e1025aff8f7eb2192a7895c79b241f5fcc49dd432a77a53f5b7fe8859c6e929ab00fc526662b4f49a28ccd1045ae7482af413f223158d0fb0e45f927d01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af19790cbda9914aaea2b790efe175b
SHA1e015ef85168c7a2a6c3bc727179e901ae1b0f091
SHA25612e8b1d7b03da38dc219b3435b409751a24b626274589fc053cadc41ba29d0ca
SHA51265aa1d9379a1e9b51c3f84bbf7b35d141bd2dc7b0122bd1287448433749f1577ba73a0613566c5a1827cef61bd1260bec56d7eee5f71b3ae3e9e23aea7f4e3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aa58931e5c83d97643026d7c55944f1
SHA11da1d8429e2a8a6789634cb9432465387905b65d
SHA2562c2e97eb48620a5e3210f44b5121fe17326fc5269351f8b567cb92cd6a994c7a
SHA512288988cc41084f833a85108514b4c5c51361f0440fa7970e5209d91ecf62f605f4fc082f6af4538e7f180c96b586180becfce8971e4601a2756c371f8a1c9b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c81324d175586897d574ba64e31b44
SHA182f055cbb2255e1b99a2aea8dd06b38830a83b51
SHA256c82d104b878210440277b9b73fb4f33fce19dc2fd22eb29533995b42bdf64522
SHA512a6bb6fd9678b1f60e6b79e3820af8b0fadcfe9f117d935b147f47f74a7f396c243b9891bc9230305982ebf7ad36be86cec8853aa2b8c5e813ecc8c6e3c3da83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a432d68687a38c66b98a50b3c565596
SHA12728f0cddd0ae82f4f5f924575d3fc2e2d29c612
SHA2560b0f0baa973e4a31d2c3db1afbaee434352df3aada0fb0f560f75237144fa924
SHA512f972dffddbeb11b265e73ab0a2e3432b24d9a24ee8588795beb93fab63ffbc92f81efd094b8048aacaffd620b41431bcfb0aa8798fa23322a7a06116478ea1b6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b