Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
ea7dcf9b06bcf580b9fda6636a8397e7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea7dcf9b06bcf580b9fda6636a8397e7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7dcf9b06bcf580b9fda6636a8397e7_JaffaCakes118.html
-
Size
2KB
-
MD5
ea7dcf9b06bcf580b9fda6636a8397e7
-
SHA1
f2ea4b33b1a54fbf124eb8bd923f4c5af2bf3ea6
-
SHA256
4ddfb09b7b099fdfc10c7249cefdeb972f13a8700f25f088409403b881e399e4
-
SHA512
b5669b52ea4c4764cabfbc0f8c703f58810a76cf6278f3a4f5f22a31a4ef7d7c0f51daa891663166fa7101761a5a1b14343ef8458c0703a3f678c108ed628eee
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09d8738430adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000003dde323e97ced773cee7d8195a4273e0fb5191faf6cfb80db6e2fdb2a1be43e8000000000e80000000020000200000009c52e914b3540460aca7c4567b683c2c73d2b342c960097be52507662704bf0b20000000ebacbe8c007b00eb3422a3062bc03104c68e983d029965d16487dee5d78c6d4240000000fda6157c839cf36e8197c10d9d4ff04d52b4cfdffdc12eae510c2e73a3d367bb43e4718e725959e34be8d32c83b9176295ca77eb151a911e329f777cd6cfb530 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432878010" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6266AB71-7636-11EF-80BD-DAEE53C76889} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2528 3028 iexplore.exe 30 PID 3028 wrote to memory of 2528 3028 iexplore.exe 30 PID 3028 wrote to memory of 2528 3028 iexplore.exe 30 PID 3028 wrote to memory of 2528 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7dcf9b06bcf580b9fda6636a8397e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd0141b744f2697ae737451946aa10e
SHA16048cf991e9e445d74602abf6a4dc952090fd432
SHA256c6052956833f82b9f8da845a3ad44d510dea9378c25eb1532723f83e8439ed46
SHA5124867bf93dfb4e4da7cfe059918e5924c884bde2fd0d0d5ad679321076f87c5c3303686eb4846123409f0e134c31d021fdbff703522efe37b7073efa6e52fbec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584abbf7f90a5486325cb5911ae7e2714
SHA11c416ef28cee0ededf33ae123938070236e39704
SHA2562ee3e068a658d88bfca908223321fc140d0af3e5553d9079c0daa9500183eaa0
SHA512430a1ca225dad868b1147124c4a0a4c43cc5e85d627610eb2beebf8192fe17dc9472f570cd76c4cadff4bfaa3a5921cc475a8ee0b95ad81725c2ef0a942ab49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6e362f42bdac3d9287aebba7724253
SHA1c12101d0c42159db8cd2458b1d12a5c1ebbb3349
SHA25644a6baa7cfb957a38072855a8db8f30fabfad033887f333355b637757eaf84e7
SHA5126cf50bc1e3c8cb72ad045bb42aed087b812c24f84d2e92e7f54a5b39b7ce5fa10c8283e5684f66034747623832e47b1421d04a429fc01c8334909b0a397dd8a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931426a3ffdffab73ddae1186543d1aa
SHA193bb8aa363ee42df1a33a2cacb8ed8d00c3f3624
SHA25676a96ee93268432c44962378b5d7b27c3fbeaefe7aa79a19d491968cc3cc763a
SHA51204d89958cec8cb014480d15f74e640b2effae13316e18bb4402af9d9bcf3f7c8ff582f738d027337346b3863d4d9c3475d18d2ccf713a61127fa0c40a22680b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab177efdaa080cce2e74df72a7ae9e8
SHA1e8c5c3ffbc4c567c019a18cfea9de1b4f5fb3b9e
SHA25699e218fa550f64f655c7574820be2fe7e6ff1ec7d15ddde7d32ae2f1535f8a79
SHA512783ab368615a8167c4d1e4a126aa8b632e939a1e2a2f4521f86aae14eb73f6427ec6ba3d6cee4ac0dca4c6e0ccb7877691f7923fa894d2ae30d9926ecc4ea9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c901f9085f404a2f8f59adb00731f546
SHA1097dc5040685100de91e654ac85cdaf6b10f7e54
SHA256550a8b3b9e700f2cab67170c17c038fea10602a8e4826af1df472b66f9ee2b28
SHA512e47633f3439f0fd5d3d75a178d2793da7c3b88cc2629a11e98d86074f71e9f9089dbea9a7e4586188698b4958ccf4176d4eb22e45bd6680b06098497fb6c82a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f7064e6c09969fadab555fcd764e0b1
SHA1789bbe3845069f149bc2c446e1f92bf31d047430
SHA256227647db1d6e09dc4ccdefebcfd643ddd8643957c1c3069daa7b1b273aa91026
SHA5125221245f6327e288de32062b3a9090eb469ce969b28f5aa3408e8c9d4f08f0efa3863b9feb8b2d26cb0d57149d66440b0d3d9bbea269ae414484a8a135e561e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e95934bf75d9c7910663ab7fc9cadc
SHA186d3666799e37edef5cb9c49ba4382d1fe2f26ae
SHA25653bb01945e9f28bd5635846417d9cb2ae8d0d151ebe6754e23fdae9a31f33d87
SHA512d9fa2f2a51bf3f953df22ad1a7476d33bc7ec75a64e02d0eebf3e68bc03e59f481b92d18f590ff0fa857c635419f9e3c2e5b91286007b4bbfec6079e4f80ddc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070f7bbf0f58aaee088e5b96134aec84
SHA1ed3752d8038bc2bb815c2d9cba16926e06f8b580
SHA256565e2e6192bc57ad24bd91bb6dbe42ad3a9c2f12be7da1e42dc34710d82c5a23
SHA5129a67b9b276beac93a6a54aec0354ec4f58fbe0a6c85ca27bd7e63dcbd2f15346d7cd6752bd48e650d250e1edcd70bc9f43665039b7a8a68c90c7c527c780ce7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc9210eb66293c0a56b34940a93b1c0
SHA1e05bcb7f8fc3dbfe60f77d26aa5b0dab232a20e9
SHA2561b8358967d890bb863d6fd54fd8e80e355d3d3209f59b849748583c1535ac69c
SHA512ccd04660123d0ecf51443c6f21d61a8f49ae8616eaa1c5bd949e06fff4f1e66131023cc91b387c8468b87e1c1188209e88d504426d1b9d567c852b4acdf401d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58844499f4ba99d70696dccc248b03545
SHA17cb9937fc44d1c929dd03e5048db34c7371a6a5a
SHA25685ddbb901db71fda13ea1d10437d99aec415f8bdb0b94d3dbdded61ba591342d
SHA51238e89afe31626b221a854eb1109f7e2ee5f6656509f8e61b2da3589283859661586fdf4174f72a23cdd9b57146eb6b98bfbf66707057506737a6f8640352e14b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1941029aad0d0b4fe13675539b29777
SHA1d88834d5226c60874f15dbb3e488e490d2c8d39f
SHA256a7965ce06764c96869ec2c295286bb239a0d06ab9321efdcf7167325c6b9e8c4
SHA512e35a0192218c9881f236b7f95aabc94f07c003cffe737c96afe537beaecadb2b95da930932a801a38fb42423a0e9256cb94a33df5c44bef68a77b1f0ea418a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbcb974d8a961e69737be23bacbce7c0
SHA1d237ae2c2432d0a914042347a004054e033d547f
SHA256499ad6dd5222930d38801da7943db5494866b6a57dcea78a968d34514fe99078
SHA51286876ba070a4952c8c391af16d39afc654b28ac5638cb0270467a72db8b11213cc3117f8ee1df970970a0a457644ae51415955084df786b4f9a854d50fc52491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5058266d5d9b89c5cbe5a11e7e3c6b347
SHA100873d855c2baf5e5f712da3c5ee58a5fc4f0e9a
SHA256baed174fb651a0811a577f01bc1cfdcfc1d875aafb23aaad299659d411ce1674
SHA512762209543e20c7d8772259efd1bcddfdb2e88894f66fd5a7bcc1b5dd0c88821f8a0154ebb1cb76de805e3dd7404e65e4b767cd5917604ef94cd0765aab52bf71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58770c4de8c254c6fff51b8611c5d8b66
SHA192745bb2dd38e6c727e1ae1b00bde50347097cb0
SHA256261e9832eda95036dc8ade449de236110f18166ebccb7b8a8860afe76a8ddffd
SHA512a60088915f05fd74d65149b9e6a5d0add1f6e5427f8ced76943db8b76de495309e7e0b9a99b3a1eddfedb4639733b9cae623e7aeec63f81fc69c59f9d12ffcee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d98d0a2fd22cb1cccd8f3601717369
SHA1e599fef5ce5792d708eb0a7492e1b149359ec4a5
SHA256234db76e778804352ec37a5da784c0e0e624a3a61fe6dbd3f5907d32b921fae4
SHA5120f6f5e002a5624906027438f5edbe550b036df2594edae348a70a8930106b7a3166afdb4af2fce569ee6727ee9eb814f5c2a09656a4222efdad39d10bd4bb355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906bb8293b8d873ab9c9f70949312911
SHA1b35b9a49f09123ad1151650d17e4cc1d47c046dc
SHA2561fde5a6076835de7c992190a29743d91c6802e9301ad563aceeb80c23cc563ac
SHA5121ec4e95a1d29d758332756b5cb2fa3d6236f48a601d99d274a064c250cfb9504ea771ae7d4ab7f0ea0f4554a711738ec5f9cce78ab701498a3cc1e69d1a46a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fd1ea6f2f4f0547ed38fd1c806d9bc
SHA10f331cf1dc5de18e45c52df1cecbdbbb6ca4a350
SHA256a29528a49c665facfc3119107ca119799630ce1e7c098e531413b40a319acc8e
SHA5122e371f1492a1a72ca2ada0cc904551876247b36181ac4dfa1756845b2e6a8335ae3250e3660cdc23bab19b960a1bc743010ec880798468ef489ba67fb1bd98db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db29a1264fbc61c469438a9000b8e37
SHA134a2d4c2fec55f3458658d71178de205306b7fc7
SHA25696272294640521232c0a8f9eed41cc69b4b03d6cec794f74ac8308b33236cccc
SHA512816e5ee182a7cfc30c79ea1b716f3f1d187f0d53a48a142e4fa63091af861ef0509e9024c810f2d321d4b59ab3d8dcbead5708a050277002248d8651631cc7a9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b