Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
ea99763af03216de64491bedba6894cf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea99763af03216de64491bedba6894cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea99763af03216de64491bedba6894cf_JaffaCakes118.html
-
Size
6KB
-
MD5
ea99763af03216de64491bedba6894cf
-
SHA1
881ed39bb70bcdd060dfbf0880f349207e6801bd
-
SHA256
4058bf246f717f7ff736af7580d72e6c84583dc859feb6e2dd6b0621243b42de
-
SHA512
ee55bd692f5270c34e1aaf1f0bd6591471dd67e61f733f9cc9582d6be0636b925215b26faf87bbfc07712be8660ef0bf3fadd71cd2124f6585e764f5c27359d3
-
SSDEEP
96:uzVs+ux7JjLLY1k9o84d12ef7CSTU9Co/6/NcEZ7ru7f:csz7JjAYS/U4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09DBA4A1-7641-11EF-8EF2-FE6EB537C9A6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432882587" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801308f84d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000c0968968203680064dfa3cdb1aa7ed7a72a50b85c7672904110b21aad81523a4000000000e8000000002000020000000635013fad603177c25e99d0712b5fa1b9eb53f13fbb5a4598f228be353780d19200000000adbd3dfe253be815de3f88e1fd366836d36744fbd1609580c9a9cb255feb60440000000028bafaa42f5de47f940ec2aa627cd1ed0881c8fb13ab97c6dc4fce9f861f37e9ec95e9623bc9698d8f2eb169db808a88939936debcd2fcc298021aafe6a2f45 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2840 3012 iexplore.exe 30 PID 3012 wrote to memory of 2840 3012 iexplore.exe 30 PID 3012 wrote to memory of 2840 3012 iexplore.exe 30 PID 3012 wrote to memory of 2840 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea99763af03216de64491bedba6894cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53893cffb88f20988edb72d3066765488
SHA1fcdd846a138f685f56cee9e698397ca40ce2e8d7
SHA2568aca7ae379084e3b34eeb29502ab23db0b0cca55eed3fe534406e2c5b66dbe98
SHA5125121e0a31628865fda97b06cc759876d5437cb45962d9db9547c233cd9e57ba3d2aab12077e6957ece01f6384efdcbf79138c0ee26a09b3494fe3ecbb664030d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a14dc689eb567d9f65e669943908f9
SHA195310b328112bc3f0504b948bbaee8cbea7014cc
SHA25621f8da3912b2a253e11b7f22b74871beb7cb863ec5370ee60c7b20f63467b717
SHA512c380e1ed975aaf73500630c2a5447debb9ed6eca16a6cb985c53411f91402ad4d04020b6dd0ee171686ebc050a39e744a588fd2af1ee0358f2a5020be81cdd5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679ee0e0748148e1404673bf2e7faa1c
SHA1ab3042092434cbcdb7aa6a49fb24a09c8f31cd4b
SHA256b6c25f26b7514b5480722a14e92d21e45a32faaa3352f9984b1f712927cc0f4a
SHA51297e2d456065bacb96790b7771fa51c9e55fcbe99cd0e5aac650a273fc90c2573aa67cd4202428cd09cce779040494539aafcb4e3f0af9414c6eb158fd4f140a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f83de7de8b6da92a74280939b39f3ac
SHA1ebeb44a3d906edb4f2ed96db7f7c31be56d6806d
SHA25678bac259cc275a9eca4603a3ce02504f07a1ad329146d18e03948c0b5f9518b7
SHA512f8ee788677370784430f4b6a9305cd6e9c1a2754e51bc4f3254e2dd3fc71b802d04ffc831d2cb7f636005d8b96dbd68ac90ab1ab70613c526dd5d257bd014f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888958645984d7fe2c124d921dd94625
SHA17023418cca94ce06b7abc63f19fff1b7b2f754ec
SHA2563a7ad2d1763146ec107781f93f44dca8199efe60833de42dda2d5ae82febf073
SHA512298a59b2d97a652ac83381223be31be989d8e524602099b18ef09f7247b426eab351edb311d4828f2a517a64e8b75904a4ab7ea2b534db7cfd9d0bb65ab65070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85d3ff45bb7e00c5e23fa2ce9b68e97
SHA1d409cc33083975f25294cd4f7451034b5c18ef1f
SHA256b63ea107b7a77391cd4bc999234b2e88cd3ee8beb90b7c048effa0ff3e08ac38
SHA5124c1098e72290a32a20aa40cfa3905adf3377a05a398d4bbc965dff3e784dfbcc5acf2bd8ce2b4c64881051f7967ec4adcaa532c574667ec4f3b5af2642b4223d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3fcc56bf60b08e4dc7b57a15c25c35
SHA1a748aec1cf39840aef9258922c9d60632303260c
SHA2562ef08951cba827aaf2f0a6bd05150c0d829754e16fd24b5ac16b967621bb9df0
SHA512d8b1650585e7a3119a12fdfba75dfd584c7aa07acf23d212ff30dd5a05e3e9460b127563a90d2cff5851936d686d146958cdcd0ed506a561266985ba287206f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd50a85ec7bc7d46b3556066b9e82d54
SHA1f20056e8bd372f74106ddd95fa619656b79d7f3a
SHA256b088d41c3bb48d94dc05979f6ff2b9749614bbea11b7ddaec32140f5756e4308
SHA512507519a6b7786bffb713d77f1477fe86c99f66a725ba0e5de566ed1f6913b74de2692f011dffc8e86f4c593eccd90606f9f5d258bac0819544376201a2f3254e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5818907ed0d3d7d9d0c006dd22e499095
SHA1bfc2d8ef51991095e24d969e0e6799226ef8fa12
SHA256fae01c06acf617bbf0f6c4d723bb31a2984018c946abebbd7b60e6200495ed89
SHA512a8dcde8371015459f9eba9dedd8219ef8cc1adf1ffb061bed36bee09c6abdc78848474ab1d4111019829b58bdc9b394da847e393c6fec5f45fa481cff950058b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f77e7159f3a7a0f93bdedf64303b53f3
SHA1a1200483d052504b26f003865d6ade756b728d63
SHA256caa90439bea9c8891feb20225592a1ba3e45d8cb91591dffce2603bf602c2961
SHA512641e81f8d07282d5f755672a2dfce7ef7e7a4924b33d3b714308bc27c407781f98e9bf3bf8c40cf5d60bd98f73f8f778ebd3e7a456aa4acbc64780fda3b446c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23db15e608777fed3997ebf21a9a133
SHA163b986298c2013e163d5896bc464c7dca04cbf0b
SHA256231c5fcf946dbb9cdc316b652525182dfb42e54883bf8df05a6c23a192ce9bd2
SHA51283bcb5f5796676c5a4fdc85cfcb2fe69026a614d2365b477ff17000eb361e5077e36dd9cdf22cefa15d60137e333fb8551db88d1f97e95d0066d580131d346f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78054647c815821189966825dbb9737
SHA11e4e9ae13deff2959e8e7a64e37b6652acb3be17
SHA2562799d2f3f779d2362b55dc4ed8311c6f18f1108388080851e030e449e588e5f6
SHA512e2445e3dda1f4ed4e09ef577aae888d63ceb817f5a14fe3155336a2479d38011c35ad0cb6a65fc491818f12dc8a0ee89f1b66f4cc5eda619922aabc021679d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532dac2c60aed60834301aa74aea59bbb
SHA10c31caeb972be044f572e0310b8451d2eb5ec60e
SHA2562aedce55ba035484867f3b428b44f2b7ec4f0a65a14c828384aeadc09d04b540
SHA51281ff3851e56c8d064e09e5841340e5666accb9d474f3294be1c3aff00bb38c5d84fd52894947ac50045a82f8e6d61544db99f4b14afb65e434bc3740f3b4221c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f840df9690a146af6c293229021bd01
SHA17f28c624afed7a66e544c762394c6704e294b969
SHA2565630772cc813e2fb5d7ff30fe7a57d0cf7877fbbe7bf9e1fdfbc437564334ec2
SHA51259409ef2c5c1e5567c79797e1a5001b2ccdb0df2d9b0ca78c044cec958ddcd3b297400ec0014a6f53028a6e944ec33a342b49178b7085f15fd069954cf881d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d3842a59b911f599b4c6db53eddf2e
SHA1943e81c00118e4fec4d2d807710f8b0f9317123d
SHA256efc925556d5e49ec86a6f08fd4c04feb173abdfbde57bb1a754e2009257ac88a
SHA5122ef16d2a0ea0192c59d6b74e8dc5df4cb78e4c2d83d7bc37babc4792c44907a0ce5374259e9b8c8cf3a2bda647c8f95210d57b7c98153aec1d0b18a4f3b75581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595899f1f9c666be70571ebd8c2817e35
SHA12488e93e3bdeffbe58472d2395cadb6d85dafb31
SHA256108907033f91abb49bc68c2fc065bd16daadc532ac2d6d8e7321fd70df21dd00
SHA512dbbdd8f00ab45168290b0c4a95a5e06d0ef5ab4cb551900cf4687acca2acbfd58793452970d9e3fcfcafaac33ba42c2bae59d4078013461c6de865b41dd3ce51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa68909db11e9f94ced70216cbd1aca
SHA1bd1b88747c8ff604cb3bc27de5340b6141939a8f
SHA256191ea48e04d0f6f73445e502e80501e88f3004ef51608b81f8cddf41522f2b5e
SHA5121d8b4602e4de61f509331e7ef597aca66429c073e6b3bc2c59f2c3942fd775906cee50d5f44cdf16a6a0b704e7c61038375f844eb603be69556453ae4abf5daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e96405bdf5a6a8c74136258a41f8dd42
SHA1318ae5f7f53cf3f4d21b8db4e8ea06e079608230
SHA256433a7d0718e523b9d676820bbc266382548eeff89a014e2db424e4855959424a
SHA512ff79ee69e84d8f8ce268e2776fdfe44e00eebb78217fc58130a17af865cc6633ce86989cefc75d3ecb01ee605e748c256545147754934dca14879bbb4b3c30c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b