Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
ea88ece75ebf368e7a8b64dfd0ee969a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea88ece75ebf368e7a8b64dfd0ee969a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea88ece75ebf368e7a8b64dfd0ee969a_JaffaCakes118.html
-
Size
6KB
-
MD5
ea88ece75ebf368e7a8b64dfd0ee969a
-
SHA1
1835e62dac4d107d3e1109d7ff2a99678cc12f96
-
SHA256
7bb5fee822bd1cc50d5561863f1ab7dbded5997665430776beb7c3a2a3b25509
-
SHA512
a9437a6d19ae87d82130a45f2caf46fb2f0779295197f019cb513f51d2c86932220c814676bf706924a3923d786f889038952c81275dd49ffe4e492c1c10518b
-
SSDEEP
96:yTJALpCoaDap9b59bz8y5q0PuZNjzwqMmFIUqHaalFgfnJcdwLzQ/qQnn3qa8kj/:4JmCDWpXZCNvwq9dq5+2dYzjQnn3qaP/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000382020331826e16e21da4f46f656af2335417fb67fcf73d95621d11b42d527b1000000000e8000000002000020000000b2be77932b41bf1ac650859a2007208a1852ebe7c4a90c8e4154ca4f9dcd22cf20000000e3d112a035c5a2aaf2dc6b1dc72c0ef3b42156a9bd1b172656ed06349b6cfbb740000000f6a845b4097cd3d8d49e0b62d9727665dc8621cf889dfc164f1c6558a1dcf592c536fa47deba073a4f4fb02d5c97dbcead2761e5b484346b39ed20da1a54841c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879821" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A6F5131-763A-11EF-B525-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508d9270470adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 536 2552 iexplore.exe 30 PID 2552 wrote to memory of 536 2552 iexplore.exe 30 PID 2552 wrote to memory of 536 2552 iexplore.exe 30 PID 2552 wrote to memory of 536 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea88ece75ebf368e7a8b64dfd0ee969a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c463708bde9ca779cda99dd1b13b2f
SHA14aae49220bd9fd4fd3a725c7f3724eb84ba73661
SHA256ddb0696d175bd1e18e25567cdd74a65ebd75b8e8a1f27d4ae5d5fc1edd4f229f
SHA512aa6a09fa9f5c5bf3b359ed720ebbd76aed6e4db263464c1e258eb1ba5b864132090cb7956cecd829663d6f4f48ed5d771dcab8d541e6d6a0f5a492edb2c6c437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e8d2f83355cad19e5e2dfb5f013bd76
SHA19c9da27e061d41f1446494d21a9354b73eed66a0
SHA2567cf3f06fd7c5fdb867636175ab41452944cdbf1d45856a4ba6f74f78be29dd73
SHA51254081974bb8c5e94b5ab8d1c77e57e2b3b661e8f068bfd98bb6f99fd9635fb375c503a4e45d0cdbc38a0c9bd5db9821a35a8d344a95c1c2c19eeb91ee7cabed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8cb9e4481e765bb4dce09e04989bb44
SHA1ab26d3b82a8fa2fee456b6abf63de331f49aa00c
SHA256a117ce048efd9813e77c870d54aa730794cd0cbca5c5916e816494d87f7e96e1
SHA5121dad223ce021c6a120551b203941c6e77552cd296851bc55bf19a4e2aa30bc1afbda01257f04798a860d855baa97042254b6cb034f914d7e658869a5c71c02e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976f7b0f87ef22fb158ce35797e91fd8
SHA1643bc01bcd4bcd37355d207894f06603570d3998
SHA2568db38c3bb45d83e1921b0b394449aff35c357527241cf77bd04beb90d004830d
SHA5126f139033d7d5d4c7b9b5d08824d707c303ca5b8be10fc57189e09f36158c5df4b6c0ec4513675af542f43f4cf5ecaf40e086a44d9456ec186f578fb991146bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa1d9b0315440b5d7194f1d0ca0220b9
SHA14bab119ebe1b3d8cf30350e2bd799f5c7580ab37
SHA256702116d45f9219a035b91f24c9378fbb53b0c8e0ab474162026602c8f9607d48
SHA5124dbfa90c1f11e1d2a9cc77c5681d01e0099755315fa7e3c1e7bb25f2cfb954bb3d5d68eb0c3558c81c1dc4182f77335860433a76aecbcf7212cf57328d23223a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51390acf7484bee973a59dd68f04679e3
SHA125e8fd5ca985026fa6416b93125687dd0765b0cf
SHA256779c7f475e5f6f74c9cf75488b14c2551af39cccc45cd240f3c6a80d99f9445b
SHA5121dbfd46d2eb78b969d5e11952ba3b2090bb08bef308f75c86395b0a79beac68cb8b7ec922290bac1fbe198aed037f6ee67588bd30f7a417a660c8f817adf6b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505107ea38e1f4f9d1a3bd9445b1c626e
SHA1b2302f4bba567dbc77de1797551529e879002222
SHA2565f54995c97a156d465a365fe2fde3da6902a6fc875f2fd8abd15424716c33a2d
SHA5121bceab6bb5a96c5475dbfeb01ea62b92fc4e82255c6a59b584a4d1241a0e5c8712a3ee39e564aad4f2f082e4cfe4b0c735adf040a67330e68ec7429c18ff98cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560f250904b1ef50d82571c69a0413a7
SHA1f0bb5ff3051d16f72b4d4fa1b0a5d3a310381780
SHA256b660c2baae988849d6cc0713dfd44e739e2ce0d8020fc0ef453c7c154758a6bb
SHA512da7dccea5045ead6d20df085ca5e76179a48a13fbf4f5063dd5800cf06e9b83c4a6ecd99fca5f316e91dd999dbfc6a97ff130fe4f9c7a824083ca2b57a888869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6d11750129c1beddcb2e547e88dfe9
SHA1ce1b2bec691db36ad5545bd26e948539d02de70f
SHA256fb5a13a5cbb385fbf80ecf49986c147fcecfc9326a19eabf5ca6c5601532df61
SHA5120946467a1d54a61ba7fdf5ecf6960833036fe7511f3ff49c1f6cff180204caf6e208c8f95b5fc3f3240360d63525e0cf91683336c01d1b1c5f9fec81ab2c18f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb344c5e072b3f72066d2bd975dc362
SHA11847bade76c3537e07fec6f508b9622da07a765f
SHA2567a3fa1c70ecc96dbe7d0150578099988e2e3dfc304e065c254cefa4eae9db6c1
SHA5129ece2036917c1dc76376a035a93150b0b5f13cb4ab528460aff68df48e6243269ba663e8b9cb886e8bab00ca1bac2b55843d06c28398b5ec32b851fae2ab488b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55349c9027f7c3c87fd9102bd0f96a4e2
SHA127aa98fe9b72aa7eeff9cc8f3a02b2e52fc9e797
SHA2568205ef9a62f286b726fc7b824f8ffd3e51719197a1e68d17310cc6a5b207ee0c
SHA51276d7d5f67f9c15addbb51ff502ecd6ca562d9930dc57f7c54a570c5bc585ecf83acca5e1a1e89c9292011d744efb4e950a55147fa5b0074918e367f09b98b4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54948b492d7da3d02a376828d71236c0c
SHA16545efb34ecdfa25ffee71cb497f33d7f810e59d
SHA25633c6352861dfb957f341c907a6b4393859261596f4fa6ffc22a056710298c02c
SHA5124fb7f524e890af4806a76b22b34558f36f10f0b7e48734cbfb1ff4deabaaec7dfcac5258b4bf185e9a3f824e6693d7544983d80aabffb9fc148e802e4d5705f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a7d9d7acd4f05c0c72114e3abf0a2d
SHA10e12b868fbf0457a7b3015561b908b2de217517a
SHA256017fb746e43b52e80974fc633a4513cb56ef91eb29d78baf9481252b4c92e349
SHA5124d87ed97f4aa87ec2c8f075e7b465efaf7e383b03ac6f51db9b2853e34acb489cc8eb5eeda1dc92e986ba1248711394d284981e774616338ab661175f49ddc8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a169f3dcb2af63dec078a615884bf536
SHA1a55d6fc9d198654b1d403bd926a30d790cc71eb7
SHA256abe148ccfb326ee00a8a7e8cca422e20de67f508929654b182f6317e2754a05b
SHA5121766446732372f4558e208bc7e78f6d718af18e398a0db3b94bfb0a598b76cf732f10c34a0d9ddaca03298b332ad86bffa6e85db6c614bef880d858385be65f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0392bb2f518de2d6cf1cac06637e146
SHA1edcca5f58023ca568a7e59a3ab0714cfc1338987
SHA256bf395ff39b2b16d40f20e0df82fb083216e624e06e1b8f72a7a81ed1faad3493
SHA5124b7deb1411513a21f0e3ba1e0dbb40c6a6aa63befb7dbdc37a5c29b910b77aebaa7b106eee78104d095f663483e32d56ffa7b8dafc939960c498ab7e22f21f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55887f79c9fbb9272dbddceae51fdf505
SHA1305f53effbe5e27711330ed98a2fb8ae73ffd7d4
SHA256594ba5043de5b3c57941ad7d8fd7b2e3eb17f2ec37ac7f6c9cf00df8531dc281
SHA512e84c156d5d799bc1c8038e7eaf39f3d728d926f64ded922fc4a8c02f3de1d8164add6e7a7186fa3356b5df2c0cc4c6e54c53d2197590e7e4911a3d9ac92139a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f1ac2eaaf631a43c0ea9e6e9769ea6
SHA1e966ff4680cda55c17da662add7024de670b07bf
SHA256e1ec8d416f66dcde551ad0e718cf0ce02e9bd885cbae8bd3939617fd04dff10a
SHA512ef8935064540e4470397e493f6eb340ddea5d8de692fd0c8329051ddf32c2b3638fbe7ef937e7276ae596b441bc53584be75744b5d38e8f3813f5a75240b7656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530141f19613383cb4c50a30cbe23c2f0
SHA108eb66a357083dd88166364aad1886b502003eec
SHA256f39f43f0c35e43a592d3b8eda9da49fb36203b6512a14d7101decada4bdaed14
SHA512546a7d1cd48a1cbfb0b1a069987442b9866a8bb2bc9c852c1846098a456190de78038839e93c500fc41a1e60f13d33540fab317a65053de40841f46584c75f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0bbb0fad27580c938127dee5b9a4e4
SHA14d253ff31dea869b4c4b6cb935bef08e1232b306
SHA256f26a758f2e201214ffa8cde2e6f9287c8f2e67983e3391fb244bb7e4f66ab2e6
SHA5126753815320cf6b3ad193b7fcca091d7ccb19619b7599e8d3726c68c701a64adde1e9ae4dacf65520830183b44b57c2abe2bb9bc168b3c795f296ee6cd87e4c3e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b