Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
ea89e2d66556e33526553518dc33a206_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea89e2d66556e33526553518dc33a206_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea89e2d66556e33526553518dc33a206_JaffaCakes118.html
-
Size
43KB
-
MD5
ea89e2d66556e33526553518dc33a206
-
SHA1
0e07b5de12cc8c8af8defa699cbcb6675e708e96
-
SHA256
39895d67d10510bf686e20b40243778b0dd39b262061a5d782cfc1d6351edebc
-
SHA512
d8c6ac689a529e35ca3c293a7f9861b64bd884041f84c4c1eab94ed48d2a150df7f30567d6a8a56f13856eb97f40afec7e0c03d9effdfa0f046c92981ff71678
-
SSDEEP
768:a61KLCX4yTiClSuzifvUQNFOAPJ3pR/C839l97:a61KLCX4yTiClSNTJXr97
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20280ecb470adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000061db0b400922c1f968ee0e3ac0d0b0e72c26bfcb3d1f4766ea0f012743a0570c000000000e800000000200002000000083f1954407f303d2bf241712c027940b2e529960c41e374951e835e8dd7e221620000000e7b9685cc0b2aa3af7ccb37899769bcefc361ccfa0985ea990cd47d82666bd2440000000ad5ab0aa375fb52fa0eabc94551824ffba4185eab24aa637ea11a7d8ebf11ed9b5e6a23de795cf21d4420da9f002d25e6b17311827153dde2056c101b155cf65 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879966" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0DFC401-763A-11EF-9C5B-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000002ea172c3d0d110e959e37d53fff1577e7862b30703cdb6861f4aabe264f27a0f000000000e8000000002000020000000db01935274ea7a15ad205d93e2bc5e7bdb5ee15477479da7b79b5c1aa3f3583990000000ece44b42c7e2e8370caeb82e94c005d37086c0dadd2f86019d8357d7b7e3b4334323626e202b71aa530db5f0edee12c27d2ae1ad201c7fbfb8de8c741c77e339e216958a0d60d2c1ae760c4f30ebf7967db99ff4e82bd47a053c549535bbfc3bbc18d527640e93bdf7e5b8bdf627e9ce26b349ab61bb4118a020bd806f19c0ba89085fe99c5400f3cfac53b0d134ae36400000006bb8fa939c5f8ac61b344663763b0d7b7bcd585cf6780541d37e397a42e8b3786cf78d8454bad1fdb853a583c598685b82038b51ba5944af699785d93619e099 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2796 2152 iexplore.exe 30 PID 2152 wrote to memory of 2796 2152 iexplore.exe 30 PID 2152 wrote to memory of 2796 2152 iexplore.exe 30 PID 2152 wrote to memory of 2796 2152 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea89e2d66556e33526553518dc33a206_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51196f2a69ac0be103d612f347257c70d
SHA10bcc216b5f2833b243ddd52f7d56843e798ee0c0
SHA25649ca1226652b6e07bf296ad88b8640ed7b055a1ecfcb275c781e4858ccb5974c
SHA512eefcfeb1fc6ee0f0f98e58af957fb6588104099b18e043784076577979877b39126bf10ca84b052ca917616930095ee0abdd601f9424c69079d76577500455ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228cf5a4b481ccc21e08c37e02bb1e5a
SHA1bf7841e26e34a673e3f8c075001e1746c12caf52
SHA25684ea3ad5c19afc98ba21a920f50d711c282f5ed4e75c770ecc6f3a3f397b54ec
SHA51293549b9c59851a808a362927791b10fca1c5aa645ea2960a5b33b9bba48e4a27f7e8bdd3440bda9d2c3505b52f6a8a03951584c40705ed2d6d55daa8ca63a451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fcd0370be0e26026a0ad03d33bba118
SHA12f04f6a45e23a949b352a5ef45c4582c41a0c5cb
SHA256eb01a1b79f5c62a0df749a61697bea75637749a2b4a8be7317bc5d7cb78e37d0
SHA5125da796d4e272a581c6e09661e8e481f66a9752e41b5da2627af22f948e005d1f5ce690c8f3c7c7f71dca4715c3480e2b19d893e8bde5bae848942b2452d824e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547425fa5b5465126d8955b939bbcbf4e
SHA18328a3f271c69a27b3fb896608590ad795653f59
SHA2564931442b91222a718169db92fe9ce19bc2e11253f74b1de392f3259dccf218fe
SHA512029e9287818f2d0114326d860e28f4b0d074d19101ab4ecc2b495323fa2bf4ae291f90065be91ab399574ffbb3d1d4aa0ce359a48d3281372d34012ba307bd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa0225ea29e7ea69cd71abde0fa8f65
SHA1ffc3d8a5c0485a0c9704b6073b894ecdf9bc37b5
SHA25641828765d5674d569e362ce0f874481dc3d13b41251d2b3ece966e78c56e46cf
SHA5129385474f96fe6ddefbf89cdbfd57c06247248569e6fa673eabd23fda4507e06e024f229af5dc6b16b9dd7943450e95bf45d2f9108addeddab4b55f2fde0c55d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebdd6942557400f8c552be49d69a8673
SHA1efeae0ac73dc762f368927029e42e6c14580b8ed
SHA25608943e87cbcd155cc4028899ea13d793b3f4acfcf95b6bc96640777f454f2379
SHA512a6a12475abfe76ad35c9d60475bd407ca0e14e529fb63f5a613f7405ef436ab18a91a29430e3baa6d1e7c909907ba94bfc1e616bcb5cbf1a77baf3dc6918b1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe06fbf41ae8141a96678c9bdacff2ae
SHA170d5102dfe43d2337a3b6cff4d5a0ada79a9fee2
SHA256c8a1e8060849a5fe2217dbcf5233bbf4b571e3d711444a4dffecda8d503c18a0
SHA5126763d2ba1ff1b5febd47b6a84bfdf9dd1f1e54ad748a5421df52f89387534de5972e915213bd409277f46c294c2b9e52c5cf07fe8deca21787f641e215bcbbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d6efcae0e1a1efcf4275c08b4b5caf
SHA1068aee733554ae49a64de9a4774d72d4f76b56a6
SHA256b5a47ad6ed5b29d50286d5715d1abd00cf96a4c06f3862cbf7d8dcdac028b1ed
SHA5121d8752e397cd51cee3256ab834acd905c4fcb1a5c200f19cf8d9764a286a48af6e5bff9980171d40a8a6792492d7731c463b16441303de9774a03360fe20d9f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43e5a4e75da59f9b2c8cf3ef124f079
SHA1de6d0074047ef4017ec7b2f30bb18df038d271ed
SHA2569b1353e818be1f5f18932c04f2f97802c77e645363ba74a599a8587506134a50
SHA5122bcc3138c88e32081ac60911fedf284c95f1baf37bf235530f31b6593f24da165b18208c489110b0a392fb2942536bc4f7cf398d16c63098e7d5a720dde43281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe312e3c71931cda377ac1f134f9e10c
SHA1314058f37f7a99563d0edc8b7ece0ed49c21cdcf
SHA25614185636126bb33022fd91056a5f77c62bc0c70784821e19a4833765208dd87f
SHA51210bee05fbe69f944cd41ad19c829ba6974cf31a29cd700337f039ba82da1cfaf0b9e20e979d61fc65145506da9af44ad240e06797c0dfdde3383b246ec7b033d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ae0d4121733cde1b0cda4995d2ba93
SHA1955e318dd194fc50bb59762301562d7e65f88bef
SHA256a500f25a8dad745af853ed855a2c32c192f3630b90284d2ba87162894e286370
SHA51244578393346fe998b3158ce7f0cfabe179575b0b08d1df84acdd78601f0f849d680ae260483b6342eb5a569469c0728a5a4b0dadbc4498f7fb9e301793f109db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0e91b1569229b493f39ef66e70c28a
SHA14cdc652518466fdc24135d2cdce6188db4b8a1f2
SHA2568032480b95e463b168989e376feedddeb064e29e0cb9caede7da795ff062e298
SHA512f6ed768b0d6caa15caa2ee097ec572b81341193de85f00568a89cc997b21cbf4ac42321c6ecd1f7c4305f3c7bee6ebf4d4c0510362cd999e27c109afe77dd66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9da87d812f8d0dfb784157455247bdb
SHA12343044adb6c90f2a4fb50cd9f19837a6c3aed53
SHA256eb59194b102506c109cbaed0070e9ef4950ab69809fa5923dee2d63c8210b83f
SHA512fb3be19ca31754dc4051ef8f0fce5c2187ccde764736a493e2b52f02e944723b8fc7e87f75b7e9aee0fb5213a91fb8e20db4dc48f7cb82d842211ebc47fa68fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78dba2ecf67d8bf183e9e70c01d4299
SHA1b26c4c777f63b76588d7e070ac01e9234e4f8627
SHA256ee52e97332cab951d9d62a0f8471a95700ded5d091c0d66d7d8d57209508f2c1
SHA51268141d1a3e278658a6b6a9e78aef0ef5761976df6a99273b0acb1bde4bd0fcc498dc3e068a24e47e4e5bd2d22d09a7965f41f2d290ed78c0ef560445a08651f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50575400cace6209049d5a5dcd7279e66
SHA12ac3d73a88c4a19484e33dc9df949c9f8660a50d
SHA256223eda1f10208c582e635f912e9ee09067fee416c9cb56adefb6cfd807f82a37
SHA512a51e7fde81cf236312bb49112395a49d48401bb6a694ea5a92cb5c44a147ef04f5a05df476c507f5fd65cefb75c3cea3514efeb3e7ef806a2358685d909751ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4faf3992068ba2dede16ad1a0b8c5b6
SHA1574f8a352daf6cdb1ef1dcc362b62942393afcdf
SHA25666b122f0fcfb12912a5c3921f3b0985290617f7c631866eaf3d7aa6457deb341
SHA5123b428b9d78aff447668b0e20fe87c274ec55ccf6cef15026baf6032cd7f4ac01a360ead269d5d65322c6ba0d3a86dd0fd3788fda86f17d31401b6322a189c6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c166b8f53fe8c5c70e918d8cd0702c9
SHA1094aa4cb783dde80009dbe664ebda03a947ffd0e
SHA256173ae0f266331442f570e0729679ea5ae4377a6ae692ad12fd281eb38a0295e3
SHA512afd995baead412d8981f80e72d385d63dce9cba6b2c410639f95441d938198f538fafffe0c9f20e30bedacb5648dd6fd1060b3ccaaaf785f422d0948af4ce28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a87532a3d10a8cf290f37aee4e4134
SHA1639e703a8299aa75f6ad2a05fa21bb540886a37e
SHA256674c2f0da2e522b5abade2ec1cad4853190f7544e3de3a218ef8ddb93c055810
SHA5122bc2227810d5244b447bb3fb062401b1b58cb498a794bca6ca5df476b747006499ba3919bd8a584db1e9bf4131cd637ca9b8cf64c305586ead4c7262a2c6b5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084a2bf346092781f7495f7c809dcb3b
SHA1bebe982529713b6c032aee3fe8957b533f8eb7ac
SHA2569c2939ea77f9bf0600df64fef26e7647872a258ea25f78f3e475a7c42af16aed
SHA5125e5f6684aba44e3c479b4c982b33245421fc75573b973a5720fb9bbb9730b67e7fda8c27c0dbffeb8edd16fd0fcb3a3cd25c75588ef38f0092784df063ae1bf7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b