Analysis
-
max time kernel
123s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
ea998a30c81e3d66bf546291d5210ce5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea998a30c81e3d66bf546291d5210ce5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea998a30c81e3d66bf546291d5210ce5_JaffaCakes118.html
-
Size
185KB
-
MD5
ea998a30c81e3d66bf546291d5210ce5
-
SHA1
965aaa9306c3f2d6ec608a428589b34f9f27029d
-
SHA256
a489d83e9d3fd194456217419c26b228788bf39a8d74493898fd026871d5cb81
-
SHA512
edff99394c0158795273f7c379d0607308b44aab340878134d9ceab65bf51bd6da634bec86ea1e724d4c28e87901cd1564929ef111b49e49a850b79a704fc001
-
SSDEEP
3072:E4Fe0Bqmjt350SWMuwK0HsHFR2u7zrmrBPT:E4FDqmR350SgwK0HsHFR2u7zrmrBPT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2019f01e4e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13608091-7641-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432882603" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000649191037fdbec7621e8ebdaf84f960a310f2765ba747dd0fa0d8c4df7ba8262000000000e80000000020000200000005386b606720582ce2193d4ad1ccdb4d2b90e1d9bc22bf74dda67fc4ad5ba54a02000000034c0c9428852cec25e43371f8bb9b8175051ca5374001631f75d824b5160733040000000bfcb54ed7cc60451e48c19360cb83413794e6ab9fb39cef5348676418fd462433e28453d6b9938bedf84fa03cd2e8cd6fab8254fbee7163d27e640e0fe20076a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2784 2096 iexplore.exe 29 PID 2096 wrote to memory of 2784 2096 iexplore.exe 29 PID 2096 wrote to memory of 2784 2096 iexplore.exe 29 PID 2096 wrote to memory of 2784 2096 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea998a30c81e3d66bf546291d5210ce5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b688a9f62ea11740586326f72d2715
SHA1d86e70df373b85712aa8a3be42891517eb025dd1
SHA256cc62a4234d717c3cf0554164138eca1ae89d5a7fa56de704e94e9be5b4f3a64b
SHA51233a674d278fdedd8b3f79c888437ec243aef1e86417e68bd68881acaf04d3ef8f9b9a5e481cc3092c88a273cfc300970747a4ff90c09d3abbd292d946e8d9d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccbf2d6b990cc937e8a7db1b2ae014b6
SHA14b8d0e0b495f3a3c8cbfbc10ec550dd02033feb4
SHA256188456869969d12935ad2641a52774844a5dcd4f43b2fcdac7a9c66dbd90d72b
SHA51235a27f95d3e680a7077129aa28a72c62f6d1ae2495775c4702c1da0da83d59b0aefd783672af0c3499bc87f6892e4822c72b3cd9fbb3328feb03ca197cd1bb0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e7daf63f86257df84dc62216976421
SHA19c4082ef56d39395d69173798cc365cfef4bb385
SHA256136369212c670a396e42806e0a38a24f53b83f7e4f7ce3d3674d84ae6ecddbb5
SHA5127ad3f1b1a6bd421319cfc08eb7365fc4c5bac43767d768b83437824daf39d385b4a3327002beefc609c34747a999911e06535d1550f9795f1c73ec0349a8d174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53fa41639908f3bd9154f351fcecd50
SHA187c84c7b6bb179292bfc0ca21ef6db32be2d6a1e
SHA256acbb650832dab38c5c7211b14cc5d27ff0f81e90c19b36e539ebc748d6b303fc
SHA51273515b9e9b73d5625e6ead4d61950193761fe98f9ecfe5c35989c677079f50128259cbdb7fac45227d9f12a25a509cf2b4f7c18ce5d571742a5c42695658fc7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50002ab4b08cbc692580a0751a2548b30
SHA19b673b2d5bacea39db10bb23055a6f807dfbdead
SHA256d54671b5e01d5aacc97d2ce8cc1ac5901f06fad6120ee8ac7d80806f15ee764f
SHA512d261221f16615c33cd627fbb9d9d772201f0a684b2f352520a7925dd4c7400ece671c358b68e19ae362c89e0d418a24586a6921c1e91125d325a391cf3c892c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e896846550ff72e316dd8f30287fee6d
SHA193c4a9338a9ebbd87d6988ec3ebdc7d6d3a3b0bb
SHA256d0f99c9f6cde420f5abea3dc45310d4fe1baf93117aeda4e6df01966045dbcc5
SHA5121244b842247d5cbed0eace832ab90ed531879634f1a00ff1deee769d96ccb626756f126b27888f68f1c13645541572afd42fe2ff27efab6fb235bdf531e6e183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546140571afb20d367f87c3fafa624442
SHA106b2a4c97b2d78d699a1d898dcea977a16dc4830
SHA256218eb4278fc5d2f1b0b00239da14afbb51def2b636306231ee2777b9833a0284
SHA51224102e81c9f4fa6d8741395ce84e24beddee3edeaa492566ef9441207b8699bdf24db1c23f3ee314843884e034f95cfb48f4bdfdf4c61ba5b41af29cdea2a53f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db81c89b53e51daa7e7f41edc398e3a5
SHA1853ec27e55f34e67d6eb9b64d5c08362d09e0df1
SHA256764feb988c313267dcf321e0fd7a7ac7b6aadf7fa01361815202ae95cf5ea183
SHA51255530295827cbefb589a2190ba71786465a6c556dc7b255cd89d81f979d24e81853ad61668c467cdc8aa455bc9c3182bf2739d46211e37695276a7b1c14b5f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51539bffd59bee9074d719185bde9e154
SHA183facee520834d8a84674f32f2c98ca77aedd3d2
SHA2562b2438a416c4087d32ce17e032d0e4017d6133c8cdf096c42977c1b53d70cfde
SHA512f876237bb9bc659f5ea2b4bcea10620711d2622fa89eb24e6b8645c85f4ca851935a7f1bc480396705c16afc52b1670223d297028e21c3d4c0d970b6fd48babf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfd43d4208d0ade2465680afdd97a44
SHA1686266cae225f53735bd4633e77758a10ccfa7a5
SHA2566fefeb9c8ec90b56b675d19f4aee17385315b60c368afc128cfeddeaa593eecd
SHA512dd951b43d29cf0eca86d36c11f8216fad8cfa770715e36276a7588b3ae2267b9ec2a32b7fa32aecffed8eb477df51f6d09edcc85d7673ea67df2f73b7590a829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597172582bc25332131beb86089a8d83b
SHA1790bc887364ca4bdf79fe49a28684e3b4c09ba08
SHA25634e9a8d7fd1274eda9ec0296ecafbd5c50ddd8ebb03c2aee9b752a284d592b8f
SHA51294709bf80ad1fe3d3a9c3f13c37242d0c9917ca6e9e937ee0feb52156459266124a0119f07dc4318445bfa37f60c054c4e548070f7a8ae7cb95a66a920ef46ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523eef86441f6fa3c0def33b94552a991
SHA1cf473458d7ca8df7d8abda947a2be50282199a90
SHA2561c15d4a7c2f8bfebbd21f7a0cd8f52a3b19692a47496ac9253717d7cae8b976f
SHA512efa19ed564e26193767a6020ebbbc90d93a0a67fe80ce12f8e7eb98c64b942f9d53fef94c3d5e1b24caa9f270f0b844d3b0b98079a444418d96be5e0465b3377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5425b47a952ecc38db34b945c678c7f0d
SHA1036706457bce621030ef40dcd03c0b009b7165fb
SHA2566a23e860bda2511a934f4071616befae82fdaa1a88cfd3ff88b9597248d91956
SHA512ccc1aa742a6b23fae29aaa9bc7f15ff928b39bafa03ef1aa126f6fbfe338526e5250dbebea83cb300b0a9f2507862ba1098cd8cb5ebd9ee3dde4a8a896c49774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8b50c630a9099bbf017cfee309f52bb
SHA1c2a8a2ce4ba282ad3949c0564cee61afdf4dea47
SHA256ea5e1b116f90625c39e46671f5541986bf60cc91322ed7489dd9f467c65234c9
SHA5121b517ffe61a4e278a4dc7e9ae4b1242a8b5aa27621d34a7e49e5e129a451e76fe7f2e4d2cf839a76beec9a79eac955e65de61fcf07d3a9cd0cafc2010ec6dd67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65f7fac8f29aec1033cdab7e851577d
SHA1d7b279d0e0371fe3bb759c8158ea4919e60ce88c
SHA256c6624f3aaa98102dc8ee50b1343b8df363a95cbd3fe019495bac7d2c9dd822df
SHA51211752c01a063211292caaee9400da35b53c0355796c6e6d7b471d160446fbdf707ecb808858668aba9986a462c3d7c002b5c82b00dee34bf7771eee0f2d2a483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55199d95c651a06e4a916a6e4583832a9
SHA1ffd8dc38e85d1757441d99b09559ff4582c7af2f
SHA256baeb3e23fa1af91223491f50608ffb6c9f848fbddf3962494fb91c5f36795b54
SHA51237c3a338ce4ef1873b0ddc4540e82ede9915cb67256eec291bb960fd94be969c869af9669da8e4873ec4d6a33955d9fd206066cbc9d19a25ade2bf3d730e8e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f5b6315ce6c697d0c8d3b4c3d23a52
SHA1d55560f8aa71ec9ac84dbcb83f526fb873ca14ed
SHA256852add489a73d2b426275e9f9419dd3cd969f29dbcb9b22c55ac243e88701673
SHA512d7382a80b23a0a66c08b293ee71f52cc430a7ffed7c3e5f411d74dfa79e76a5ea185956a69b037590c7d6566470cf2e0cc5ea57f7612450a196e66e75ec98305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd38e578e3fa43f939bed85d7194fc7
SHA1d6080a36e49f61f424941d6e83493ae458285ac2
SHA256c3f776c1bd5db9957e70e36c510ce7d95c564379c9031ebbe11e9b84e98404e8
SHA512fd23c86e08330e116aead1313575e90ea4d3803de6ec5139ae51f64327c5983705fa168d5955af55689351bd909201e62ef0700594bc1ea9512f0f870bcc4de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a986e4b902d64952684beea2ae7f96
SHA10242b59e7c4eee15677968876be6d6a239694b92
SHA256b297ef7cf6440684706b5b80dd49f3697ba030fa16b8e4dc523f2f3f54090946
SHA5121d7398e9ec4194ff1785f125058a6712614873ecb88e5c7278ec8f947f872701aaf27f8ab47b2a82f7a5b3c2c98c5040ca2e2a308b3a3d569b63f89cfa36dc9b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b