Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
ea89791ee445e83aecbbc9d2442a26ad_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea89791ee445e83aecbbc9d2442a26ad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea89791ee445e83aecbbc9d2442a26ad_JaffaCakes118.html
-
Size
6KB
-
MD5
ea89791ee445e83aecbbc9d2442a26ad
-
SHA1
170c3f5a85cf099f296f58fc1a1c011aa79bc572
-
SHA256
491ffcb1127c7dd96fc580e441e5ce102442ebc91fdf51ffa39488cbe2291722
-
SHA512
548235eb9f1a20d96a959dc977416cd62406ed1d7de91660a7cfaecf7dd4f7da819e5fb4bb1995ad46372f6c3eccfe683f8f0ab9895d8d1420a4c3d95fcd44e2
-
SSDEEP
96:uzVs+ux7WWLLY1k9o84d12ef7CSTUpZ/6/NcEZ7ru7f:csz7WWAYS/c4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879893" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4BBC721-763A-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d137b2470adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000afb126cdfdab79bf2679de7c068da5737bb44cc2f42a4b2121200c2c75ed8dbd000000000e800000000200002000000032c55922ff4a9fcf2e0aa9f2dac763373b9f986ce183479894fb58843233532120000000162943791b270dbf36d56c994d756e7f72bb2699eebd06e8bc4c81288de5973a400000004b782f117a5590065a9b8d38e227f3e51f1703fef4ac908106838b6fe63067d0fddff6b0d8f4925beff97853493ae366ba36ac55306e5cb704a98c66d4aa58de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30 PID 2908 wrote to memory of 2548 2908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea89791ee445e83aecbbc9d2442a26ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580059a37a10b9fcb38e515d2afc652be
SHA146c695aafdb8d755a4c0718ecf3cb104bf0ca083
SHA256e32e112feb1238e7a4bffdeaeb9bd7db2df3c50d4e1283b85a6f59849a9d6aa1
SHA51277597e915dbaa4bf09b6bea41da40ec0e8a56545f6397ef9864594b48384a252b21ec6853dde0505dab05c85feecb4b2f1fabca9baaff7e49d29c592b24aa07c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d08c1ca83e31eff5a8e35ecda8e3f84
SHA1f17c08369e92ca4b61d7be87f610bd223c31464b
SHA256d8ac30348222fe7fd77724fd708bf7844a7c0e12c311300af73b7556e6c520fe
SHA5120e5381bdb6a885111579cae9e3036fc9b7b307769cb9a4558b0f41e0c1560982a67e015b8361cc9fe9deca79e2246a2ab99c40ffdcec9541467ac404fc254478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59527820ce0503bcb1c7c22100a529f82
SHA1ecfe2ce1be71d8dd778f832f4032a42401c5c89f
SHA25678be2ace580dcff9f1410fc7af62f30c479f9b3ad781da2d375474ea32ef7ef4
SHA512b561a10a7e3d1258603c4af2ece6a8ec2feb17ef3ebd3ebd2681bd37c5a72c3d496e6dc5d4cb157eafc14a868159fa878c9aaa28b1b9c979eb482742c25a5b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508873f4539dd93e02afba85cd36a0772
SHA1344049963c108de33f7d208d6a86958eeacf4e00
SHA256eda7dbb0d4104944a085d3c0ce0e80c80ac5aaff6c0b61c6bf359b0bad857d5c
SHA5127f04b5f351ed7d5e5eee04004c9c4c46e331c034bc95e3a4a17c4a98c91d72bbf93d41900a87045c9a67629efe0433df4f9d7b69cc9fe4258027e062756750c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f9c7298303f323e26a88ac69069283
SHA1e78fb196381c0cc83657e364bac7513a46874eec
SHA25603d86ba047992d5c3183c5f3e6b31f0e37fdab0270a01fb7932355587e468eec
SHA512c7cf0c257c720bae35db915783a77a4a06449bfb1f07b51411336054bf9d3491aa40a252df06cbc1deaa78aab21d5325a779b3a5bfedd4ec5a82f6b09ccf21ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50621af8ec12744b0719bf4b11437c5d9
SHA1f8849fd2cf946de414b290c8043bdb012745995e
SHA256eaa58a0b5b1409f55783410802c59b7f880d703eacd8eb7102020d3888eaa2fb
SHA5127350aafa0f8b0b7907bd27a7f4a1e0ce48f142bff915e5f1708f9da0f24114e416d12f94ee4ba96168c58402cdee98f38af2de972d97c834e66e1d55a9559217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b976e1b535b449ade58feae93df424b
SHA1bcdd2eff067d986cab4985de2f3b528f920e3496
SHA256fb4ba86dbcfd1d13431ec6e46b75fc1d0fdaa6c5b4c7ea97ca2189373a3509c3
SHA512fcd4b8265c24dea989890d68df1117432633dc6d4006e2a51fcb69c8ae541267d0b92e644bbaa480849d07129c6368a86161670572fc73ebf504b9038f9250ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503ffc203426eba236dde9cf6730c54c
SHA1ada0bef06d541738763121cc72259a2b12c3214a
SHA2566b99c3635d25d39a408ec6b3a3347056952fac76c8823de903c36064fc618ffc
SHA512dedf22bfef22a456504c347e8bbaf6422df1e731486eba79c2af7ef1eaaf2c0439f42e338394ddb4c2c7a254f80d0e06759ac96a6030f214f00ed3db63156250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc81686eb1bf35d755381a35d2dda210
SHA1aab98f48ef9d6d75c52fb6ffcb3771cdd9c5bfd6
SHA2569083573fe3ea7bb385dbab0e3d821ad38a5cb300552d50bf5c1f2378996b9b44
SHA512f46b453cd2165b0435ddc06733f1db535c1a0c639735cc7a15823499037ac360ed9c6e7e402a06a4a0c101e92567929c1151380a17936c3ba19c210260fc2c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56126f4d175496b8096db63d7bbc358d9
SHA1775d5043cb248ee4732c8e1e8b027ba2c4074ba2
SHA256d52e632fddd016e07001d92bd7276b540c36e97fd8ddbb458ed75a0ff04bfc74
SHA51276ba7760a59bdb65fa41bc527ca481378819ca8da94e7b13009492a90080008a60b40541605611a5ef30817e290ef588d15655764ea31ac16977ec9f90cf52e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b881b097c970fcd661153167347b830
SHA1b7d45d8be3a13a7fc00082ec273c08e20736bdf8
SHA256328290120f378310c42f613eeb89fec4ebce339cc1c8958fd49d5c9abeec5b88
SHA512e7d1ac490b94ee7bcd2f6300271ced2eef7095285c2a20820280c0aa114da12ba3cf47f40ec8a8e32e68488e63af36f8460aa646af65c0d867cefa1e7da6dc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e7e54c95ef0f5c54cb2883cb8b6ca73
SHA1d0af0db0343c8c70acf21f96fdf2332af3d51b4a
SHA2561788579a4bad1120f644d740ffd41d25fc4016e2e684608bf4f14f0b08c12151
SHA512256364f3e7d9935f550a6a272a85db39e5bbfef89c968bb7370d1fe9d7783472646f93c2f92f69fc1daf5900c80e6ec189c9438e86dccf81cb3abd7cbb53a6c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e937d28c5af2991dc7f0b87f750024
SHA141275b75a82fe74b5b3a2094f4f059f4495bc609
SHA25644446663604c5ed8d7410274088f7303e93e9bb7156111bc2d73e60e60f58f7b
SHA512ca4445b65ff88bfc047b12b46cca4dcac56a368e6b1e26e68b7789a0ae0f3a5f2ee6306299e7e5f5d619999a12950e8fc8775f00fae592b39e541c9b21b02d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc70aa98b8657b01afdd83c025236ae6
SHA100dce0ca5e50a4a7b145d240c708895885b7f4c9
SHA2561c4f2d283506abac6cfa9722fc7939eb5ff0b42f3d653e2fd0c8151801ff247f
SHA512258d4023761d72375d77b8a327deeec65df9ab71123d02d5077c0c52326181694c5efa864ea76ced4595818aea20662d8d625302918a4e7e448c9453dd56df1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d5f295af580789e9fdb60146f4804d
SHA1f659c78bbeb23af9d2c691d32cc573716247789b
SHA2567d19d53901a3da66bf0c33fb622385c160557321aa09ba98fa4238529f6395af
SHA5122c84ead311d2284de939d6e7487c9d2c6ba6274db8e8ff4643c2c037f823fd4c48942496e5d2e5bf4672c92d2a3c276746e9fdd3003dc38c5d24a1f81f77cb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b627cc7ad755a27d1c976cf6bb6df21f
SHA131cabe3711d20df125d02744e94ae5648f736e1c
SHA2560afc5bc4c00f1eacfce0cc3b77d1ba0abe287690552b88f43bb629f120d07e7e
SHA512b00d9700f4f0507dd8ca314084632f8ead09bd256a7dc07814ee82016a5070afd821a26638290c68d320ab5a78e660152feab982f2422582d4d5bbebbbf17558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532e9a0325736c8cf7f9da680f02e0d3
SHA1d41238d49c04c527ec001b5d6fe2725a052fafe4
SHA2565dedc369104ffb4fd1c03a464203fc785be49e0c5b022d184d13057b3308893e
SHA512c76aae259e5ace1ebe0a1b5962ee6ab484234b33cbf590d669f17700b38a992fa4641b87e65e101651fa6b18886b82efd2f4302eee2df927219cae3498ead33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916d6bc2438b5e16a18f7662771f9094
SHA1afbd272a1065e4e8d397d207ae154b240e39bfd8
SHA256b1fe3308cd5969e6e533affba3bb8210f9c4ffb2c6c4ee30aba0c2dee76fed77
SHA51251df7700de26e6d70c5af1838691b8ad1e143bdc74a280efb9c04e771cc382ca8d6257cf039cf91be3cf5efe76f2a141c8894249bb3a7b8708ed32fcb9b79b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbbe5544b79e7e9eacd1c85424ce771f
SHA1976250337d2d997c143580db8b98ce1b5533d596
SHA256ae3ae50cc7723ff03f7c432ce722e63cfc9af16c4ca072d056a92b5453966fe0
SHA5122d6abf7e3cd2a5bc0b441798f53b2423b479cd983a559232cf56e9dba307867ff4136c7d194f77c19801442d71d3986a7d60ecf535ee6702cd6774fc67553f71
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b