Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
ea8a008d4bfe3031687a3d4d5c48fa39_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8a008d4bfe3031687a3d4d5c48fa39_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8a008d4bfe3031687a3d4d5c48fa39_JaffaCakes118.html
-
Size
70KB
-
MD5
ea8a008d4bfe3031687a3d4d5c48fa39
-
SHA1
cfbc2bdc847060a83742028a843ac6bda8f6f202
-
SHA256
90a7955cb1982c6ce6b2abcec63794949e03422391b3091ac33569d30298a916
-
SHA512
140691c3b5c2b1955ead4d3c52d22ac30901c42965600cf33b44cb0646c52f4e9e2331c3f54723e1684aad0d054dca192a6412ac6e4ee233cc9711ca4495d65c
-
SSDEEP
768:JiagcMWR3sI2PDDnd0g6on8RI/oT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVGQ:JoYRIgTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6D1A591-763A-11EF-B729-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805af7cc470adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879977" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000009c895bab8b849e3f188cb1ad2eb5ea11fbaac439ce4a172a3b05fb4b34b73365000000000e80000000020000200000004fa61c6c81534b47fc1e5d81e453200793193ec86f92d89946b654f612be1022200000008aafcf1247ee56822b22d85ea365a64738b5a5d6251a97c52a904e635dc4333b400000001edd2580b4b20bd70a23056db7c06c2c765f8f263608fe78a3371d72de8603972ef085b3b419cea57a744ba9603a724b4b8c68a9882279ba05746e5818a3b99f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 1972 2668 iexplore.exe 30 PID 2668 wrote to memory of 1972 2668 iexplore.exe 30 PID 2668 wrote to memory of 1972 2668 iexplore.exe 30 PID 2668 wrote to memory of 1972 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8a008d4bfe3031687a3d4d5c48fa39_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504097d4c8d8770b022f717c38766d76b
SHA1cbbc1f24057d94efc1e4cae6a7ada4d68168ba18
SHA2564a7259020fad82a1640f0432e276448f58c393b8bb23768242ae4b0b0ec0fb02
SHA512f992e5c2d1aa2e6aed976274ce86893ea5f897fda5229c74fe0706e7f2da9014559101d7af08377d22b2485a9f7b083282f51a00af321a042e37bedfcd38907c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b89cb3262159fc0713f9a1751699465e
SHA1fd65b326e11a450d870f21ec49be82481da9b433
SHA256a802fbe6e3bd7d0139dcd4b284854ebbd2d5238371ba3b30abb66abc0cf7d8a2
SHA5123597afb0167cc4aeba04c18921705ed1c74241c0bb6af0ec5ccf233d82a5a785b871d06360c8bded95cdc7b34cd60140d0bbe1cecd0414aa16aeac0c3d0c0db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d26a051a8036e8f4262874981620088
SHA124cccffdfe32dffe01512b5da2eb4dcac2ad0045
SHA25688bc646e71c0c88a92768991ad7abb23330fd81818d58b16e4161a23c0fe46fd
SHA512c75867bc62738179adb2b19fcbca19adfde63c7f362954f49d4e07d922d4f142a7510d6be2c034d4880ef1bb0df8eaa1055e53d27bc21ba0bac4c68f499a3fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52447cc5394a4a1c926c1ecd419a5ac27
SHA102481adffae9e1bad8d6f92b06c49a07d74ab505
SHA2560e6ba2199fa89b6aef2efe4138597cf03a0decf1c9a9e4e396e0f99da61d4b74
SHA512f58bf18720b1780e2e5f27418ae564f028afbb172a454f2a1af239889390b2afa97156af6ad7a379819d76194b65fe03a77ac6391e82d694ad8b7c98d79968a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566647ac013ed87b7e0e8b352c0aa64e0
SHA1ae103c8db4e83c9e815330495cf9abf0aca7ec00
SHA25638d3db1b17c793c3c01a5ad03c890e8de0e74ec1a789ad6aec3397f183f1b7dc
SHA512e79a3d77b2a9329ccbaf6c7d1998a8b1711371725029e23fa12c6a6b140478eeebb132f1e0a83bc233c9477d625fc7c4756787930a2746c12bb2dd7ebc32ab21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8fd7ec6f910c684be3c84caa443cefa
SHA1d303b4689b49cbec33b2c1359e7a21e4cd5884f0
SHA25631cc364cd1bf9f427c644719a77b9f7ed85d0f4bc29557f8227dd784a000d064
SHA5123b8244cff2b52f1a64485ae5c1ee2d4da5d3c8ea0d2269ea6da4a6e09e7d974442991c18dc41b52c1169115fb485cbec19f2306ef17a034b73c2708b5235bdd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52167b4c07103a241b606c7da7d08d292
SHA115f5fc51f29239a712e3a23d05442031f9c9e693
SHA25668a320ab0498291ffb51e2131fcfeb95f89e21da00f127e8a610c892e14bda1b
SHA51271f26cf80859dbd3fa300db48c13526263c14c235c106d86358a284d55e0e5317144db5a4c30c4f1e263aa280d7a127563494e6c49217b632c7641db59b26781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b72d2d382f7c3f6200be3d4b347d44
SHA1c8983fcd3f8d0fccf0163101dd4d1ff1d08da07f
SHA256448229d72e1441434de585e14401116068487d538bb96075b5fe6519d37339ec
SHA512828c8541c6c873364a4e8fb7e0349db82b00181cbe8ed2b5aa6400d36d08ac508237e01409420f4bfa05c868ad96b14afafd30d050a85d74f5688037fbfb8ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e74d4844b9c1d688b7c17722af1436
SHA1172889e9fffbbafe63dea9dc27f6faa766278264
SHA256a530d7486ab92406690f6b58e8a67831ce683fce7e2fe9220f7b216a2087e563
SHA5126cf0a126a456e833d9bfa414d1ab127218c24f85541ea2318eefba2f4f9efc9fea072873e173c9ec01230b356275368af5a639563fec215670c901b75dfd9854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4bf38e05c70b4618dc3cbf67e94c02b
SHA1a87cbb7029b57df3bcdb6fb41b8c4e6ee6aebebe
SHA256a8a11d217804fe8cc17eaad65c4a50e2d47273f8fbbbdccdd603f66f57a26d69
SHA51203b5e22372b619b0d2d16f5f60989f033b778e4318c8341cf3f7780fef03205f3266ca115147746477fb7c356e429cd49dd3856c0988540f97b8158b3f60f3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40b4050affd72a6f2358ee8cdb624c1
SHA184cb86b310a9b17510ba95de8fd6a3e13a9e8051
SHA25629e95d114a84c15af67dab9383d5eaea7bde573d98cece2b4ba06593b6ec0630
SHA512a35010b00a63022f197379798df5b49f28828e4f2efc801d4f55a6f08058407280da717376eaad0bcb6f208e7c10b919f27e8c99ebf771c8d752d236b9040980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bef44aa519220e2f80c30bb936dbb5d
SHA1bad8c0010198414104e1b47c58d12eb96d9480c6
SHA2562eb00299d6fa842fd0b0704a8483c50b2cc2264f41ea6a060c8229f4108cd494
SHA512b9f1c5ff878c10df1a78a7e2a57c6ef380eb5bac1c53fa785cd07b80f4ca043bc57999c9f49c9f92c0d75c9e777cf5ff3cf2502c1865ca750b61e371d38bd660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b297cb79a680993c90deea940094eaa
SHA18eb450def976cd2d243d8e4fb23ea64753fe6b62
SHA25699f8718d5d27a8c96118f4be64f5704262150eaec2d0c99738ac691362cf96df
SHA512223baf32104cb78775c09931552e676d05c570e7e7d64d83cf85d3b65f1f1de9c927baac0596f9282883c531b0f5c8738a63732c5def2fe56325c4574482e381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b78e7761394ac108ff8951e19e0967a
SHA1816bdd643818a49368f0eeebf9e11b48fd7fb44a
SHA25618d7c6bb79de9cb24d9858333b4d5c57f04d8e9a77f81bec1d1bf747c8e30e67
SHA512369dd9a5c41dadff9aa9d7fbd2db162e8153b3a0fb56436bf22d55bf50e03064c25c3fad0f67b3923e16959a322998653c7d312ee9341a5759e088e7d799e0e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56859cbc4f05969547a04e450a03207f7
SHA1d6453a854ff1d57d3a7e37b9521ddb4b1f87565e
SHA25665e684628f86d5b0bcdb3df51b8e2d49d96841e059e9fb27a406eb60ae8e7b53
SHA51271df6e9acd290340414b2b71c03ab77456061a2fdde958c0bde0cd766111742bf10dfa940509da632ad432ee43e96be803e445621e705514e491e5468eb0232d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ba438f8eded582ad8e212259f815894
SHA124f518a3f9cd6a8c468159b3fefa0f2307b967ae
SHA256af4130873ed347277d385fc9feb40c8f031c0409c344b50d79af9cd5c55b89c3
SHA5129bc5f1c959e573e4ef5f0fd45835405a2e9cfa0f64bb10b7fc0f68fa567d7a9c4d89e9a2ce102aa7a6ed40d24d21928e42e0b1cf4c6d79238becded839119692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53650b2a0b3acdc9d2b72210ca6bb9b5b
SHA1b28e8cee0bb187e207b51c571667d4b4611e6a60
SHA256965b81ad88bfae9e6db86f54bc107f032fcbb9c4afc9b7f319aeaf9ee23f4360
SHA512345f9b2b226981e02abf076814323bac9118ea3ffce03a3762c7326e3b5664d72cf7677da16a69d2d841870cab662131a48319d6bc3d9bbebbbf8bba39e91eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171861d1f02274f87ac3528eb355149f
SHA1dc15f27dc738671e95983beef17de9933000f67d
SHA256e0f3ef7ec8f053ec8de82ab47143eca4ebbd125123ce2422bbaf7d41db6d6963
SHA5123e3d601103078f2bb70a955683507125d04fdce3c9003dfdeae7026e2d52470ed9094c438836792b487cd8a20df540884d29a7f008f85c830fb7dcc83a78150d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e26b0cc2d6089f4fe4c548f8d129a6b4
SHA15580db8561f41b2fee6ff3a8efeab6e4c0c799ab
SHA25698e93f1c34b1671fa53686ab925c28bc2235e651a3d56bb342ca368a7dfacb4e
SHA51258cfcdc00ca5e19fc9b88c130701ea074d858f60a90488e8ef6fc7c3dfc3704c9172509ecbf183f706abfb33ee6184215340be885ee398fc8c850bfa47d3b5af
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b