Analysis
-
max time kernel
80s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
ea87033b39df11cb2c08e8295af704b9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea87033b39df11cb2c08e8295af704b9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea87033b39df11cb2c08e8295af704b9_JaffaCakes118.html
-
Size
23KB
-
MD5
ea87033b39df11cb2c08e8295af704b9
-
SHA1
bae7029df20d35827e8b89e4aa93af11a8306e72
-
SHA256
8f639c4bd51a2fc626c4723797d087b252cb64f15b8eed6c2f60654f0dbc2649
-
SHA512
fc6ee29130a07aa7ae503197579bcc02facb6f83d62a5f0ea7ca27cb51255a9b1cd7e90d0f37d262588d2c274864a38cb8f5cfb3a21f59479042ca702ceac1c9
-
SSDEEP
192:uWDMb5nPqnQjxn5Q/WnQie9NnwnQOkEntWAnQTbnzZnQfCnQtRwMBdqnYnQ7tnEI:aQ/ZSTNu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f86bab460adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879494" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000a3375f71b3ac05ee5556a1102eb070bb8882349c5f8096abc50978d5f8d0bde8000000000e8000000002000020000000e5d236b06a986e9e0fa9d8f5854f4021370dedb349126378b270afcc63ade94d200000000d4c0a721ab47ea9bbca019fdf53e4703b5796ac6c180a2302d67e7d3ea70d77400000007475e66bec82f370128cc414256d767d268716e998fc7f7babbf8ec9e670230e645ec478252814fa33dd739dc3a8eb82a91a1e87dcef04f468001b5ccbf5c49b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D64E7C41-7639-11EF-B6CD-7E918DD97D05} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2720 2232 iexplore.exe 30 PID 2232 wrote to memory of 2720 2232 iexplore.exe 30 PID 2232 wrote to memory of 2720 2232 iexplore.exe 30 PID 2232 wrote to memory of 2720 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea87033b39df11cb2c08e8295af704b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0fd93a65383ffce9a054644b3e3ae3
SHA14b6b944b62206b031ae307fb0ed0db5464666447
SHA25602648a0639698d881db0cc49b73f88c4700dc107ee7a31c059bc4988bee45bc3
SHA51225cc421743910be8a98b0dcc2a2dac01f2ec2a45122ba55671e780486400e3d7e3c390e1e1037f10f8f56c2e3967a8514b357400853907ee64dc803822e2a085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f2558992f30da3c88aa6871967df96
SHA11722d14c1599445b319011ac9bc0056f734248c9
SHA25670e1e39c9024e4ca41a60ed54e9c4f50b642fa84196126e0b9bda4797e3a5780
SHA512d163bb39a808c2719d218005dd87b2cdc7fa0272b29c1371e62dd0aff03602d96be67927508da0e59e65e13a1caef4ad825458e308a86e66757fdcdb761c5de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07f3b9e794cef2833ae91d47e08ed01
SHA11d25ceb3e9859f773ab8b271aad23d215289ea42
SHA256e3b681b6b91736bac24b844a10dda34d91d860641df42d601b3900e2b00ff4b6
SHA512994da10d4a5a01b6d066338bb5624858fa2f870e39c770a4f51d2cf222b21b9d9f99bdc91479b5f125be0cec45f9aa07aac236f75f2f92d33cc822cf8382b5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ef85ee135f84bf91d1bf1b3490cb86
SHA106e78ded0cab86a856aefcbdd4d5a47332e22f96
SHA256a4636d3d75c9c86a51b29b45060181b3f65d4edb609d93114c948a54813e1979
SHA512487f3adc10418110a62a509dc2f16f56dcbaa31b348627ea8fb5c2cce16e7db75ac311373d4372b0dae84171257d1bf4af1200907a026cfa076b1d756dfe6b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab6957969816c34bfe6f26faa091a0d
SHA14239db71fcfe4b66bfc3ee3ca247a216eb5ab46a
SHA25669f7f19b1804b483d5e1a37fdbfc1c06dc217e20b6846a0d3fc13e9af2ca1974
SHA5123f676b3c1ac859f08c58a028bde0edd79b078384821ea3b3b04b08adb1dad8b61625b05a96ec71efc4468c55bf4289b0044ed33942ab42854381e83f84cad28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b44e26095adab261147fed891b4e590
SHA142c5a35e02a886763c66aa17ed81c2e2e28d1654
SHA2569a954b3f35281d26d732ae80203281626298813a27fdef1a3f998f099b5cf594
SHA512a40c9d242f6c029a7b02ccaec1b84e071e408379fc6644c81c8cb135ebd1a3e64fc26a648d6903467a2ebade1685e88354128a66a10ad837a0a6c0755c55e2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53824abf37803b2a049575f7447599c20
SHA123c4b5545ae802f7ba08d2dfaa57c2937524411c
SHA2563c1a78bb1b5706ee3c11ce8b8c17d61749e8879a21d1462e0c33e0061aeb0c08
SHA512d7e710efc0c47f2e2a7a67f490271ceb714e9336cf43a54451427ded844431283a214e84c9ef9b9485fb7ddcea0466146ca3492a569d5c976acc1681433af48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e07e0155b9200bd5ed617226cd19cf
SHA1164c7e37796d1558a040f7e04b82136e6061ca55
SHA256ebddf7a903b369efe1d9869f01fbc06d8ed08d90c588610541554babb8bf7b64
SHA512697c54132d733a1c4aad506aca27a641057df79aa4d06ce3f6589616eba13f2ebbf8f1ccf30f85037def56936f439991551e49d643264bb3e386e993e1333e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba894278e915b2819744cc34fe0715ea
SHA1a88c117ac58237caa8b5f32f92f5c715726d940c
SHA256be3ad6ca27a524f7fa1f02e7ab47969f7e154c22b22e4cd26c612a9efa9837ed
SHA512906979e68e77ffac48a885b5dc53b786ba7956fe4c9ef9f96d46328162e0a38bf09020cd102b81f894dffea8b8396087b10aa376dd4640c6c197847d741bd2a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537adc6a7b093e02713bf83d4e3233881
SHA1225f7e6a8fac5f1481819c361cb4aa6c6dc08103
SHA2567dac44d4fbd1bbb4dc7f82df22ec498665ae909f2fb48dc7947555ce75e05bd9
SHA5129c5718ed5a5608a73f3f7ff54f80820667175eae430635328b7a23613a5b50b2796442ae35d60975f20fb9e2780e6d5cd0aff63c3b65273331aa3435e5592475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f910f94eecce6ad4b118f0a5612860b1
SHA13fa12586f1359499a9784847227e0590cbafacee
SHA256befc2930e59331427f564b9ae0fbaef59273cbbe08c7649e1700544cded53823
SHA512eb5e9527905e69a9d53ad8b36d64aea58040205d89e19a914970a00c94b4202423ffcd701733f2fc2ff1ff992a61c43e0c901f6cfeff1d26903f80624bb86802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c708e99f398c05e09e7ecebb656a8f97
SHA1a0c4619341a73c0104a7721af41a463c1c65c1a6
SHA2562996cd701e448b6599b7df079fdbe22ffb86c51f7fb59f59549dfc9338832d13
SHA51215a5677ead1ae84bb79b7d41c549bcef4285d6cf1a4282619d3dc2516abfe160da5f488a341a9c659641a5a0884ff4903b1bf963309d6550560bd465254e8db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad514d63195a8fca3601f47ce36e3f5
SHA1a50294ffbbd0e4fdd427afab29d37f2ca0b6b303
SHA256fbd978f33e5503f941737741073bd236d4ddc989d79a5abab4b6391ea49039a3
SHA5123abaad21df14b1611003bee031481c0fd5f0eade4a40a6c2dffdb38c0ae065d71e87d5c019be6aeddbc72b9795fedb261d1ef72017674e3df9d748a1586a1e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51464761e629872d42cbddb212cc0a843
SHA1bdae2f4d565f82a15f7a6a113afbe0cbef39987e
SHA256e198794ac32d9a3f4bcc8806de5993b11857f17f13f4bb876eb8a4cf502492ab
SHA5125966d46cb877d015bdd07123b7360553a44ebb6ba9bbf0aa1669ff214426af9633b1a2c76d0e9f26357c771bbc0ebd575c9279d566309e7a893ee1a34fff51a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523fdc0127a68b988b66ee5b29712b9ef
SHA1af66400c48d3d0303fbf8d1c084f5c7105705369
SHA2568fc4828cbc7a5c9eb64214108ea8b34b3e271e7df89f9811fe8c62f30470f631
SHA51214ad74c9dd235bb3335eb5ee102c51434827173f4a4fa6e9711192c388f7753c528dca498c6184b0eefd0a25a7278df3b91e43eb586844f817ce35aae08a53e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916fa019ca538869dc196e61d9a133b7
SHA10425fe665bdec43fa219cb91649ebbbfed42dc56
SHA2567208dec4caa09482f9064fbfdc724722a4e9a0df2cde0b03286f763265998850
SHA512c53c2da58d9e47cac81dd289bbd7297e1ebca24c62f5c65d7b5f4906fecee9cdbc5037198c733d79884d6db1cb713215b7d45276b74432bfafbd7c6a6550ca12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec32c5ad953d4846306f742d95998e0d
SHA1ee349a1292075346a119ac8e706a4d624b63fb55
SHA256bd6be4ebae9d1fb66f66c81fa36edea536b0783356ca7d41e4ad7be31061b966
SHA512f641127b39dae0f07601712bc720fd8c238818a8703508cc90ce826bf6855bff1ba6ee07570bdfa4a686036227ff808dfdea5c145520e591138e6ebf9498e99b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b