Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
ea99a750dbb92b40d9872cae598d8cac_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea99a750dbb92b40d9872cae598d8cac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea99a750dbb92b40d9872cae598d8cac_JaffaCakes118.html
-
Size
3KB
-
MD5
ea99a750dbb92b40d9872cae598d8cac
-
SHA1
e3964cdeeaddbef0cccdfbb3dc8ba8947ab22c40
-
SHA256
565e35f8c67eafd823d2f60bc64a053ea58b44f81df8dbdf3e63bc1664f35fc2
-
SHA512
6a4fc0c9104401ccab5852f275b796eac6ecf607e089d88ea09663e9b4ce69827ff70ed01ab9b375681993cf1bd9f0e92d13aa67f9733d1d48ae9ce8cc2cbfe5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A94A621-7641-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d474094e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432882613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000def50f7e98a3b6afebb2cef401122eda30b02ae55581f57b3dbfe5acf2efbb39000000000e8000000002000020000000ee88b7b64204e571c06f39a62e098ae4e9a8ab5ee5555bafaf59d6d62de0492920000000f8eb268497c2708f6ecd51d951f7a06ab6489cfdfbede9e8d93496a8bb21808640000000eee60f6f961688e7c443e33f815d2a3200a18f697c637da8791c8aa486484e98bfa19d49baaaf3afb6074dfe3c5108235e44097ea4062474ead1ae68f64be06c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2212 2776 iexplore.exe 30 PID 2776 wrote to memory of 2212 2776 iexplore.exe 30 PID 2776 wrote to memory of 2212 2776 iexplore.exe 30 PID 2776 wrote to memory of 2212 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea99a750dbb92b40d9872cae598d8cac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51636bf0afac88aba738b68318ce096fb
SHA14d208aaa367a64bc3351fc25fac07e035382f795
SHA256c377ae541a64508f75e697d225033437e6dc9f3e585d1c6a965d63ee1dae23ec
SHA51244dfd5261b66b3fc6f6e969803a1d9508eeb8d4490aaf847756c8e0c7a06c43b1ef8c8d76d5f8c3d8ff728c08393c4361275f7b756d1ed933dad1e92da49b05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce0909e9583cb8c947c499b230cce24
SHA177530969ded0428a4fc1fc0a5e93382aa5097894
SHA2569b54c0e7cde9bcddfadacd6e1d6d5294209e0809b0cf09fa0bb438a805a36110
SHA5121665f292ebc4fafa93ae9b8d537be5c15b5dcf25750218358001b0994bac3283c79fd595612b358dce066773ffeacc2d9813f4685f54712f56a032e9d009a156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aaf3661e37f0aa5c18f19c778186a10
SHA162d4b51c304a6b87d478a243f13865882538aa6d
SHA256b5592c7cf3a785504614b8058db577c2e63c3168bb02c061e37e7c31eb0e26de
SHA512d2561b0c529ae3e32d577e7b14ce5e7025131d4df6920ab2d32794d69d26e64029d2a9c73b656548ea79c99a20a0fbaf39d607b45d728e38944651269c4864fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ccaf55e825e408ff1fdfab524a480c1
SHA1b13cf2d52d019a3f62e30f0e16b8837eab29fdb5
SHA25684c7916938e8eb5f5cbfdc77306a5f44b7b9d3da18a5bced4ee17785ec06b30a
SHA5128cea06c74c9e0174e6e6b6c139bd67884b5dbbfed7678076d212078850dae22874ad0e9734d54210765852caeac5fd2915642e55c8dd253e8e1be811188c156b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fc28bff4fecc62988554e06a98762a2
SHA1dc0efbc30c766a7ceaaddb45a8ace0a6dcb7f8c9
SHA2562593b5e99747d01cb43f9b63ca800f709f08c49607edd73c331a11cbf8aa1f8e
SHA51218dddd303548621430564bbb3b27eabfd19ed1fcc1e9e9e6d17c814dd6d8871204045f001f27a86b1d556dfda03d94dc854dee9c8a1d40a84009050ef0304fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f62f37c5eb3c10a7d383d6a7f30b674
SHA102b985e20600c16a9de59684ce54f02913773fce
SHA2567a9a9e6eee67db65c8cd59a068544681bd1ef6079fc016647a741a97b5d16003
SHA512a4c541d6f28744c85474dcbd7b8a52be1978ab7ce257774c245465ee75f8477d12bae5aaeb790a138ab2ae7936de45c69449e7c578087042fa67d205154de9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a53b899701147a4f4336cd7f356c8d
SHA1cc61057a9701e33d42135037cfed8ab7b34e9e77
SHA256b0b1cf55919f281b7c5d95772b77a42b4f22d23d20869fdc5433b8ea89d40681
SHA5123fbe3de7ebf7cb4dfc10e262c40d0d5694caca64ce6c4d3c76ed5cc53238ee188afd48c9be6e24a88ff0f4517c8eccc64e256456e49d9a2e1ae7267140dc1c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231b91b4e97e48872c1b6a37cf16f8e4
SHA1ed42fce84aa5e1ca8fff1c8dd0ae5e21ffa12412
SHA256d2242bb297660ab59333eeb1fec18f61f65430b5f601f304856ec0101c3b5212
SHA512459673dcb25afd7ef0cc64c51e0ecd206f1624e113d5879a830674e49cdd62db79f72832ae87245dc7dfb5a195c66c83249b09ff709e201d9063477c1465593d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e23bbfe16d2cc558068e943132b831
SHA1c49a617155b5b402f2a75e8b84a0c8113b43a78e
SHA256cc8f5fbbc0239cc232e199c2159d4dcd19748096fc1cb623fb9cef3d4c2f588c
SHA512f490ad8ecd94c24a07ee07f6cecef15b6449ff14efca0976478bab8cf7a85eb6a0f22bd15d92df8ebc977045f809907aeee4b1ab211118bde3800ae466029e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e061b7001dee1b4384bdc5f99888e6
SHA108b974cdbdeac80a903f6b6eae9aae0a64f21df1
SHA256dd2e57684312d164d839a47eb57a6d542f0123022e96a7010d0d72d5b8f6ae20
SHA5124cb203bd9b5acb8b59fbc82edbe78804b061606e596fd815e3748363d9737a66608909a94538538964f2cc7ba1aac03387d53f691c0fcd90472239645d150da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c157a5ea1d256bf7abad1fe248929a26
SHA18256cb28e8c2dbc940b314009c69d51eef4270c7
SHA256492a229014cf06ba2f824d8b3c1352e0d5f36070e80bb366df5e526b088abcf0
SHA512905737e0ceded8fe91f9567f4f5c7ad03d9a634a573f6ec900ea06b228847bd3452862923e816fc5f9cd5c4892fe742ac45745a270eeed28cd7cee164452d10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae2473c66a920fb54229d40d974a9d3
SHA16e062e497b2e6f9228ae39c9b7b0fa539a06016b
SHA256071952befbbb3d651d90c741bac0fe2d277432b3adf8e80d1884152daba1e959
SHA512711140a012565403ccca2247e16aab720bf86704d14839c945062067bb894d307ebc5e4d021f40c655da851560beb76446b7ca568f8fb9861d152b5cf7a5cd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb552eee50e49383d0008dc49b01d63
SHA1a7a3a59a5295b2e91e18ee87bf213843da101a40
SHA256d548a6ad49942f7aced5bec14a56d2bca65ba8ba52e10f4b8eea3809f6208971
SHA5124a7a707c1be7efa48b45fc838bab36a64747646eac5a6596c5a90beccadaa89604c87359c278e43b6a4c5668b0227f97d9f1b45a6efb55d5f2600117db04bd46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9fe8c163ee4f1e3eb3ca8f79e5a06f7
SHA116ca7ac09aaa4a915c7d7e547d8d551d1151a78b
SHA256b9d9dd7544870e35dc64f0c031782eddfa3bf83b51fa05b8a997e28c25676918
SHA51208030fd946dfe3bdcf1999f0cc4e8210cf90c7aab5a04de4a90fc610232c88aeafa98532cb8ede1c7c1c2b801e30a4df1ea02f3c05281e79203c4069d3352867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687feb715c80598060d93ebe1777226a
SHA1f95efb4fb4de973b35d159229548faf6186a225e
SHA2567fe21716d06f10f3a529004aa01e009661cf07682e3ea968e0b0e19e1ebe875e
SHA512688f5c0eb3ae05ba7ec24f7852121ce3ba904f41e9e473409d68a74047d1e83afcda1bb07009cd9ef530964f78aa90cf60c239fc305030770bb3252157c29cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09a33cf25b05beb64ae30c3a8371cb0
SHA148619f9c2eac98c8578bc4102b13ac33722c5272
SHA256ed5f813e1f8c445780ef70d5c59333307b031ecada1cb78f5cd607d60924e959
SHA51297b13207ad19fe1546a32cfd9ac1b8fbcccfd5c39e0e8eede750e5247156567e3c12ca3fa032078c57ebb23579fe0325c29dc60c6562529f7a99123aa5b191b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda69669d7c0f4273b2347c5dc868a9b
SHA1e79338244f3fa8f4cf122a934638abcfa081f1d7
SHA2568e510ea429746b5af9ece2f18061a6704eb6b7bb01764212cb663c4f0d0b77bc
SHA5129c6c206a7aa25165443116d6b19a529ba8487ef6086f9065c9578c6067ec1da167497fd4c550faa7a66e3d5fb51b2c31bd5c140ded841c20994709534ca4ce7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54047d018a9d09f3c16c9a274eb87cb5d
SHA1931e67c2ff4a4418a8eba74b5008781d6e9c0492
SHA25688ebf7cab3e88d01ebafa1514ce8775b23f33caf9b0728d33f0dea6346a1251d
SHA512eb2e2c8b182f8562d9f6ce88218fa9f0a11af759ef4c55e189c9aaa677e93de9f88df3f843d5dbbbdc14639bd2efbbe32c85cb8b41b18ea8502fc95bd7720fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f17ff49e5c4c9628c64a3308dfb97c2b
SHA1cb013030b48c28c89223c40d360838c49e3d3d0b
SHA2560f258e7c56573cfeb8fefb29931ff13f539edb47f62fddd0d651b5e1e3ab5d97
SHA5127d8be6559e8b8dacd53d87b16a15ba3ff7fa85e7ec0cecf1c7e6f8035bb1a06b4b2b662eded17e070a1caf9c41e2565ac6c456ee0499d834f1f607b326660539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56692faabd6b688d68c1b22e3b9e53733
SHA1df7651906d0e289e404d4e2fdb58865f72ac96bd
SHA2568a46663c409c4c679c33491ce882286e6571037bb79d7228b70ed9587b60259c
SHA5120f6b9949da6df56281dd334050e26a7e9704fb8660e4b866c188147dd042cfff6b9ca81967a11051821ae8cddeff44fba106b7eada79054acb4cc185652382df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b