Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
ea9526f9b9b13a62bb18d68d816de0ce_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9526f9b9b13a62bb18d68d816de0ce_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9526f9b9b13a62bb18d68d816de0ce_JaffaCakes118.html
-
Size
14KB
-
MD5
ea9526f9b9b13a62bb18d68d816de0ce
-
SHA1
7da29a8ff86571a27ca97e1070072bb915a6ba7d
-
SHA256
3fcab3a5c4047828e87a883d34e28c5c680cd21569e4e6e442c756769ba89395
-
SHA512
201b2659d4dea1990b9967f194b8cc74a44aec05dc5dbe65d18bcf405116aa3fd93ba622af193f4de049bbe0c76f8fdef78c5bddfb3003f965d59d880c14eca3
-
SSDEEP
384:CyisD095dN5cMJX/RKaoQFAi79y1wDduMNq6PX2e44PvCyFG:Cyi5djcMJPSQFAi79Io0M/70
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a072c3504c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881916" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000fd9e41e5dfa9f4a3450428c9665fceca6502915fe4d7d4a3727101c970ff5fa9000000000e80000000020000200000009479c0d2b37f71cac4a030a3f28cfb6e6b028f05e516d040fd3d57791768279f20000000f8f0c9b3ee203e1c49f0a74b144a666d31acb9b0f947701caa54e36ad0be8ac740000000188841a2ffd55d722cef775532466525771508cb29f6bbede7095ec90bd1eedb5d2658dfc862c732a2f8065ebe5b4a0fb606b0ed3f6a726a82173828ac6d328b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7A9A0491-763F-11EF-AAC7-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2328 1908 iexplore.exe 30 PID 1908 wrote to memory of 2328 1908 iexplore.exe 30 PID 1908 wrote to memory of 2328 1908 iexplore.exe 30 PID 1908 wrote to memory of 2328 1908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9526f9b9b13a62bb18d68d816de0ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1af921b9c7df227b5b543b50a940f15
SHA116c8a76e2c6fee875a71cb9b0a7dbe9cb29d0b50
SHA256e3067f8b5c36a200d85768fbd1a93cfc12f304ab25511d4d24e815bc2fd7afcc
SHA512ab69b2dc186e167cd19658f08eade0a824d2656707f653eb2db93f9fdf626e98ce80cbd50c794c205e6857e587bc80068b3287d835f7034efbb430d3833cd802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd381efc7f3ac7ad5396b6b117d571b
SHA10a159b4aaefc5b0d30737748baa6dda4a4bdfd56
SHA2560ea1d9c3b17e72039e6f4feb78ce1478f46f2b580ec83fd1122e428c2f244b32
SHA512e5b63c7c217752f9d7d54f8a1733eca03de036ccebbe46c691d30c24a204b362abc17ba68cb6bf4797615c71715070b80d5023270087775f57b304e48e3513cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518de37b32d55a370aba10103a09d67c1
SHA1d03cba646ebd1ed660df1d5cbe31f63d4c9927b0
SHA25695c9fa18408496c108f88a190efc68595284920db5b7a5d0498770e9bd472f4f
SHA512435221d05df179b66e133780ee0afa8db082b1aeb382a6b4a473f979749598e827fc09e613e65207e8b5d5bbf51b9b4ecd7f7b5d5d8d86215754ec427d01f8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517431f0732e04e53e8212c802df98b77
SHA18660160daff0fdb03bbd12877757a84951ddd6e5
SHA256fdea14997a91ce06c57a4b30671de822944f20af4c6e712ca8b117920e0ea32e
SHA5127fb4e3aa720c95cd99c4c3009946d242626e726d50229a9ab20ed4585198b27112d5b6651f3e5bd8c8036ac1029854434c8904b93066c9b4cd0aa10c9e560b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50473f0662de6d3365701a413d4ced6c4
SHA1f570b8f21f78a997dd86a6387c849ed9d9274277
SHA2568ee3c8a8c7972523d36f92bd71d5d45ca9357e477cff91a2f1494dbab6e6b308
SHA5123c6cebbb51b043332d1b3f26f12684063cb30cb74d7c34a17e3cf93ba1d4f958d533ac365c4943bcf6b4334b31afffa615de8e9009f8cb52a2e0ccc7b64bbd61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64ff36c02ba606c63ba4bb0ac31954c
SHA16bb93e062be3b702f15f60a3b0b72f48b0163f88
SHA256a7eb8f48048251d5dc32802092c23b597049b22564b61823ec60b99d25af3cd4
SHA5126d5389132495b024c8660af8097ce1fed32a52f0d5b99d1391b5fedb3562b0ef8e6fec8848947ad3d6f7ef21cf44338e9b97838f3b0a364d13bc8e15b60a5ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447a78f1d2b81354691964868a99b8c4
SHA1bba0a0df67fbdd2e84482dcf77e3bf80b5df850f
SHA2561c3cf3f224f60bef5e0c8acd91a72263d2ac31c72ae23692adc7f72b1fbc686f
SHA512b3bcec9f836f10cfd134b902ffe71c51260eaf855a304cb4c09ec8a499c05f88a9c924638f97322fd2046743fdb6aa80232e32d9090e04eb4bf204647812797b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f5be3570f01d9385691185e30e9027
SHA15643a6848e7ff2ef96fcb829d867db2b576a8574
SHA256843c5693e8fcde1ff985d175ae140fe7914932e59e77399b4f16201d9fbfee48
SHA51289cbc3f0edf060f5def34977733de98a234ba0087d54ec274b77e8525a999b695e6f86e74f9f43905c79b5eb4d847916c6044f2c195b048d2c2e74f4d8ec3174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54857ffa123f616730b3ed01ac5302cf3
SHA19e4758963bd515da82218518d488eef0b76e3109
SHA256965ca9f1caf69388c37fc9fbd340d81e247af9eadc8d12aac1cc31a0630af1ab
SHA512d8a3dfe20ce5fa4b090028c4502e116e729e39f361561ee7ba933411e50687691064f102bce9f936f4efd57e9f3bb5ca4cfe3aa4a2d4acfc8ee83169a3a93145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532214a831dfe4cbc1a471ba9a0005579
SHA112f71aa088e25cbc471a27fc1e0eabd8c014c120
SHA256fb64df4ae6e9eeb2e79f24717de2cb5baaf6370b3a0844057e68fa0920acf80e
SHA512dc2eb93396a8030c75115db7c2f2525ce8301c6132d9499579a42ae7f323fcaff89e3a9546b25273d5c3938bdd1c9cb423ab095c465758200eb2dcfef2bca665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8b89484e74d8c9f4f5c072e8ccc307
SHA18695638d78cbf100eda5a12656934db755996e71
SHA256d61aded48ea9386c53a9597b982c1d62b334a599299fa2432e16165a98790f0e
SHA512bcafdd36a85b3ec906a3fb4fd689f0f7117b36afdcbe1e4700e1229d1ff4969d8749fbef4a0b6479ca608627d5f259a4815c0ae3c5440044efe84598368aeeb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd1ac49915bbc03696cd811b24aaff8
SHA1839d5dfbd976fd4131c3959d4dd380c0103706b8
SHA2561133f47959bff28eb2743665c94714810babe0904f9bd02dc3b61ee23c3dd47b
SHA5122f0deaa1d52aec642223d618d8f2d10ee055d1b76f8be872065b717c1b1d4b5e8f682d5fbbfadc6bccd7126185fae3b03438d951c30fb270697d7fd0dbf945bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5617d13a1a876679bc0e73aa7994aa01a
SHA141df4c2d8c76e09755602536a78a83fef5b84ed9
SHA256c6e030b5177aae0e2740b1a754863a88a65b625d4783419c36931371ae84e179
SHA512218e142d0f4cd4e157629fb6e5862d2615a419b0b86eacddc7999ce4b5ce2088a231b4a7ddcd90d1b46eb536caef5390569dd196ad321f54c62ca5efed39771c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54330ce4c2cf4ce6425033596bd687cb3
SHA1c0d740fca0d3872d211b16f64bfce00e3a359ebe
SHA256f80a6be2767ab4b176acd02173025e9421d9e373392e14a3ef4030831039553c
SHA512bab6b8360160b1abc7036ad7abb332078ae219398a34781f9629ca5a91c085a0e549755b766c3e6ee54a88481717676d817ab79e3c92e4a7d1e5a6fa7354b6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e268964aeea32b35afa21fe561ec75
SHA1a8e0ba9a855a65b54bc09a9768ad29aeeccbe2b7
SHA256a8617ee06a14881754163e41a67a0bffde90ad5d21ba7270fdda4a22f459fb09
SHA5121b8dee9a983a632f33b50f7adebb201b4826d4acced1062b8889b241893e8d91d440510975afc158969d4ba0551886c24b3cdb52d3a0e1b623f61c7397044133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8639388fd01c91ba74758f11cf189fa
SHA1da032e23cf053ae74180ec15fddbc248ce3e6900
SHA256fd574b70a83fe4745893fff426e185bdad36bec14cc3e3d9f768e20e39af4606
SHA51201fea7f43ba20750dafddf1fdff99aeceea336681ff1f1a6cbb25148b513dfa866197b96c7e3b7ccb6ed0c989bf4a88b7fb71aae5b1a5249c308ce76b161a7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58018b8c468b5d778fee848f68876848b
SHA10be717f892e9a82b6b5375578892570adec96ba5
SHA25652b3544b847100f23996d341bc7464bcbf2eae9d867361a53b5f32ff5cfd233d
SHA51258e45db9dba74eed7c82b5a713d500df0fd6e23990b1750fc82fcab25d4c0efc93a918956e32ff257f11e8319e077452f049142072460c449e4464910a4083ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c813bad088687e3e4f4e53046b46c64
SHA12a9303c755f2a653e15c37f21bae4062fc90b69a
SHA25636abbfd9bdd3debc9755eadf6d9dc781f78b73c9a92e1aac73d4fb6f029b912f
SHA51233a220a2c61bb06dfd6fb8ba17876bc467c1fece9f1e3a8142c825313780f38e5d8f2b7271c42e460fd2c0da14ff681fdbf4ca05f5fd6abe5da5aaed57914911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b4ce207509077cce8a35d8da3dd990
SHA1acb0c4486536114c6e168157dd52b91ac2216c98
SHA256138f373de35f2938e890f2bf4056fa77c3d331bf30d832059c2a8d7d48300eb4
SHA512af00fd4efd7999a6af8b438dfc32b6f5fc0812cbf1175d6d7197204c93946de064542ff7b14d1150b36deb0ab61fecb279559d2a8c0f040ec67b63d32267ee40
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b