Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
ea942fd675875ced446c0a3232952ff6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea942fd675875ced446c0a3232952ff6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea942fd675875ced446c0a3232952ff6_JaffaCakes118.html
-
Size
8KB
-
MD5
ea942fd675875ced446c0a3232952ff6
-
SHA1
b880435597ee59554768ba57265f49f7abaf52a1
-
SHA256
2ba81f9277d5ffbd9b4150e4655f3ec3e5c68063ef6978e8cdf66199298b8dfa
-
SHA512
0396d44fe32f6f0b67d8f7f89dcdd388c0890f272f8f271a538be1d4453805576318d28c8ad7d3d312a798aec8cfa6e2db4835bf96da183b29ab9d154e1f7c46
-
SSDEEP
192:9qU4N9xAH2kX5OFkC0cCrZEcWhPyaAuhcWNM4w41X2R43Jl:90N9xAu0gcWm41XVf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14A38261-763F-11EF-BC08-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881745" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8028dfea4b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000aaf8bfc8a7d826484ee374e799a876eae7eb4abc67683262f4169bb902fda7c1000000000e8000000002000020000000cfd96e276243e4706b16810375b0e4c77d5e4686d2101723473d251e5bba1206200000005c7767a01a59906516321bc1d0b1189797f00820f64e7019cf83539f810f788540000000c259330a3dea6611089c122dd1443e1069f6eabb9fea0839253f2f53bf63456d3d18788eb213a5136d964259f8db171c0d0204f95eb080f2433604881c3b1eda iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2308 1940 iexplore.exe 30 PID 1940 wrote to memory of 2308 1940 iexplore.exe 30 PID 1940 wrote to memory of 2308 1940 iexplore.exe 30 PID 1940 wrote to memory of 2308 1940 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea942fd675875ced446c0a3232952ff6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55edb491dd11a72837b197321f91e0ab1
SHA174bd6b62e224a3d371fb8e1b68198e2cd9d95bf8
SHA256843badd238aedd5dfc7f2a85692ae4c8e2b0e203206eeaaf5e0d94be937c210d
SHA5126ad36327a21392708cbe79a23291dc500bc6a455c274a340acd305e93d637da6bb21ebae517d222680fbac57a9edfd565b8801397bce72ad7ac07e0c2996ce13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557825a7fa24912365b4f2d312a985dcc
SHA16d36878ac9b0a273b1e4b9925cb93d1254647258
SHA2565a0c6a281bc9aa77ceb1dc313a8979c21ca1d3b4c291a916e262cf2b200cc1aa
SHA512c4f3061a12624920ce9566a8230a37f48aba5315b93ee2488822e617d2c2a7c72f2325fcad1fdb35f4827b01c99e10eb01463921928b85ac08cc284cbd5e30a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d99d5255b122ee335e11b651508b7d1f
SHA19d6bcd399e850f1585d0701429c4b6eb81043521
SHA25686eb96cc724a01de4e4b9e04d707e15c0beba67a38ee71eeddfb93816e65d1c2
SHA51280f5de7e30df1bf632ead12caf5f7c7ac5081a9799ee0cb4b99f75e0bdbb184dc754c543bc738f26011d446a95c3870052fb6dfa18f072444485a884510e8278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63cc15020ca6e240185629ed4730453
SHA15bc8a72d541a90e6c5c78b9911c99eaa597285bd
SHA2561845ae0ddbd5ab742d1f8e25f7495896820057a3d01e2819758d0979a0931c1c
SHA5123a5ccb585f4aec0a8d1586cd163042268b8280e986a8ea39cd94ee01f2acff11eb759900293047f927a832026e26dfca988a45343caf46b8427c3c53d0ec85bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93e934ed3bc8e3462bd94ba386990ac
SHA1a02670a15d397591ec9d2bce462bc71671019546
SHA256a963b9923a1ffcd8cbecb01c3d49ffe46985f88e605902ede3ca31eaf7faaf77
SHA512095708e541bd22d0c96c85d0ee2b91a64a3665178e071f708495f07562c45d82241c8a628e3533e5379a475ed29773bd8f49fb2f41ddbb090d4121df6efcf74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c926d145f9967b6e100fe40aa313fcf
SHA18217a9255ee67da42d73672f0008a9a1e68e10f0
SHA25665e7c5da088724997ba9c0c004764219e758ae4b58c329306cf319e82e49432d
SHA512f8be768edb2f5452e7f64306fc245a8bac4ab4c75a8d54293fa16443cd2dc5664a6a9966670cab331bab842a759c5bbac9fb6f1dfaf3ef073f6f331bc372de5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568445b76d146e2aedc3dbf09c17aeb3d
SHA1dcc1580ea4b1218886e994430f7a87c095387f74
SHA256bd087d36d011d26b049e9a159bf0d1fe335a404fb36a5c4cdfca98e026f1a288
SHA5126e549371992f61f6dc28af283565215a58d442f174bc102d662613cdddef641b95c063df6abbf997f35e1a5e5a15837c47f2a5ca3e92906ed24790ddbd65154b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36d723fb264a4e9a70eb6d722e71dab
SHA12b231e0664980ca577e25c112b273fd5d4b7c06d
SHA2561b9873cd1986549be7bc6fc8923ee15899dd9c350cb6f618e885113233c5645b
SHA51292eebe393de30546aa354bb7c95bcef59d74e1dd22c15d990566921ef091075c9743c0c851fe95cdd27d032b0654db75ee9e73c59e3b0441b78487a749dcb71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b165b32edf55549755a460f32d67ce
SHA1fe8062ad5e53844bb0ccd70c7cb19837f78d5440
SHA256b503b8ba551253bc9513d545bbd91a689bd930c74a116f9e4e67f7f08be1a343
SHA5127cbe5edefe363bd60a5246de7b4f92a5ed293e57cedfadd7ddd180c117262ce07a8e30e2476925a76c187b4a8f5b2f877e95e0756cc36a6573cb874d5390a733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f184b280869fd1f8467adc8feff3bf0
SHA148d3a41f8b6535672ae134245a71b60ed0e72f92
SHA25668116ba6fa582a8e0d3d15dbef1ac495a10e73136b5c6fd58ec3c639d91f96b4
SHA512a77fe45c410b5645aa35b09c4d6e9fa3a91048d4b641c4e223c43656f7ed8f9a0c4d938ef28efbe584ddb86de53f45a23a18331e82fe007f1937dde85d65ba8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4945d39318abd4addbf72716e2195b
SHA1492987ce15e0e37989f109fa787210044bb16b5e
SHA256f9850d02aa9e18f9b5f1e0516853cc45300058fa35a7c83bc7c053ecf9771837
SHA512b0a472d582d30f45b91f23466d748f2ea1175466119ac726a5dadbe46171ef8b408ab74f0c9241ec39c7aaeeefe760316f545cbf235a78699dbff92402d9452e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea4462f395b066d0fd15152c1e5c55d
SHA18cf726b3b05e8a269b409381d0ab4cad1a8a4d08
SHA25699c1f972cbaaa0a687b5dac3c4d5302004da23456103a70bf656a688774a3028
SHA512e91719667bbe0e0dd687f29e6969b7acf03009cb57186748ed4061f795207a8dd6c83eefd3f2e2878e69d2a8f3507549350386406e1c56ac4e7c61062c7b7e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d54fb116bc34641878bc04ef96d25c40
SHA1ab8f4d91bdd7b22f14e3cf90bbc19e5f56edf878
SHA25665f5498a119013a5eb632bd7f8af37e045ef9a0b2551cd1897fd86d59fb928e5
SHA512b5e18a059c8b5f8ff25244b6dda9a4e16b195c8bed6fc9b3f2f715aad72868abeebce1ab986c8cb0e3395a71dfd520ac1c624baee10fca0d092ffe6337bd5b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0031828350afdb85526ee386fa0e5b7
SHA1049d0666ce4d02e8d5816726186663db24c1a35e
SHA2562d1ccf8246f2d9c36728fc3d7d9fdf3a88c0c839d69945b62b70fdb1b05780b9
SHA512d81b7dd5be075ee8323e7a01ef5ebf2cdc3d0cd4a11bfcba62e0b8e83f0697bba935c91d2d76054095aeba47807c02e7ec5dff558c23ecfe1ec3acf460ea3c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b28dd1d6e29a7b3f5444a3a50eea80c3
SHA1502ee009961281a07f744cc965ae3d9b152814c4
SHA2561f5cca2198ff0ae2808e9f5ef51a9ff449ffb3639fc593899bbc4c1b2cd99ad0
SHA512478a7b7106ff4a2e124bb5a41ca9637cdfd7335aba5cd3d531586a49d54d34bc4efeeeecd62414b2312cab48a4bf842a3d6ce74447db8aa710285ab79e8d6b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5367c68c3896e25fcbcc0c65d54ce4975
SHA1e9ae0b11cb728591a4ec6139f6ee26955f9fe8cb
SHA256989f21849278831b493689b98e27bcde3de42987c57d56e3729f06f82af5a0b5
SHA5127c2c5516236bd2c2649d86bbd7249276ca99300e2c916854c7f7057b7ecdd241972f837b0cc4789c8ea4245a25f1bbc7445d34bff733183a596ecec40d071a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd866809a10eceb284d5e155b172675
SHA1c3c126cce6c91a0c2ac763170bcc4ed854e8065d
SHA256e77b211dfe7741a1e363f487ce36991c42df54422e5e202de7318d8978a2eb87
SHA51209e8069b0e6213878058dde982a63fcfe351e89443e39cf535093b71a97f33c087915fc914fc1d3124e12402b83aeb22c388802d4aa529721838e26059bf89f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7e18db701baf72c1b5bfe52ea0b374
SHA12ceb7b701da405be2ab52e2f0dd82bd5a4270159
SHA2566e5860a4ed87fb7e144f8404de9bfe27f90577ecacf355421e2bdb442071e252
SHA5125ec4c1b3936418f06f15d18c7a440843ea177caff18b0587315b99ef8d0bc5621971bdc6301329721d3f56d228f07ecfbf1cbbda561a505ccbc547bf45e63640
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b