Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
ea8af175304551ba5810eabc536a0f50_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8af175304551ba5810eabc536a0f50_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8af175304551ba5810eabc536a0f50_JaffaCakes118.html
-
Size
1KB
-
MD5
ea8af175304551ba5810eabc536a0f50
-
SHA1
3f321d22cb461ecf51e1c8658bcf24dab8c1c8dd
-
SHA256
79df15a39c944535f69c235dfe53aaccffaf2e17f862a4c522aac9b493b704ec
-
SHA512
21fa264a51fc30db3abe04f50ea25412c8d72255f7a6c193d87db9f80c3ac7a3eb39f64b6999940678109e3835116096ac7da22c06802f582eb54dca6ffe3a69
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000e5f50222b43e8ab58442897f8b1b7bcb0803604993d03e2aef7ec773e6b6226b000000000e8000000002000020000000002bf99ef5545ae70e0054654b0e8ba807d69c372019937a8474893a687cb72420000000309ca8ee6183ca74590ab9a0edd061a60023969ef64904fb0c71863abec1a26440000000457712265566946af1c6eb705af5d7195a82666d0f4d44bc307ca0c6e5274dd0ffc3b2f569fb97f08861740a100972e1acaeb6764d8ebe47c28503710c9154b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DEE9E91-763B-11EF-87E3-523A95B0E536} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03f2334480adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880150" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1812 iexplore.exe 1812 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2284 1812 iexplore.exe 30 PID 1812 wrote to memory of 2284 1812 iexplore.exe 30 PID 1812 wrote to memory of 2284 1812 iexplore.exe 30 PID 1812 wrote to memory of 2284 1812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8af175304551ba5810eabc536a0f50_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba83cf5138f270008dae4a0d54fe020
SHA11bc56acf4cbb8eaf88adacf104f16224f61aba13
SHA25607554e6c9976914f9b93b113f5ffa4d7821fd015da62fc59eb84d35f93463b10
SHA51210f3d5cd607b005ac6a7e2307dfc90856b41eac4aaa1876a91c456b2d502403d72a6861f8fede14f8bc2ba3d243dc7ff679fa8fe032678d7b7bf4f316cf99377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5950e133aeef4b56ca351f24405ca0cb1
SHA17a222566822a2f464f87dfdebc3a901ef44ec556
SHA25641ffa77102dd0446c52ba43499b7bf260a5f54568b9389ba48d7ac64a0fa78f4
SHA512e0c60b23734dd5dd3331e0c277c1930b4979aac7b4cb45af068d3ea8c9ea0a130928f26cfd4ce4bc7d54aa9bc018ba04a07290148682f850822bf86031808861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568854f62a09752484bd824fddfc95e5e
SHA1e6a95f0fbc77cbbdf4924f7cc965f10c8a2aeeea
SHA2565db93ad57c1edb5e3589c0a748a485954fccb03847550686847101b7a0af720b
SHA512525e1a0dd55ead68319004c1b96b004cf656217b2360a2eaab0e6ae2d502e99440348b13e1f2573c86933628d73f0a64a5aeea4a952323fd76121aca0b6fb2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363fe265f396746e4a959bf5607051d9
SHA1d5887045abf834d4dee2c44a0b08a1812f2d7c53
SHA2566f2aa2ef990715b2b448fb6d4ed7fe5c3fa2f7113e1e2dc38b491c087392ca1b
SHA512a13325b1524c0a870355e8b51c568c34fb275d023e7615c94af9f642790e563fbfb4334af259ebf2b1aa06ec5d0a504ddfcb8cee206f14f9a5cf3ef445427e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b2fdfcf04da660b3a2116d718d111e5
SHA19b86a5164e49b6f2aa5820303c0a736868cc1dc9
SHA2561d34d8b8e1db73daef561a8daf878b5698b8bbf21f661f876c07a62c885903b0
SHA512eb58249a41fbf5ab888d2960b24f8cdd029eb5a83414d86bc3ec30e913aa2890c32896d9bf0fa58b028f415026287f87b9f1c4041e2487d99649c3e2384149db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a324201e8a1636ae474cab034e34cdfe
SHA1eb8a1ae6c9969778df75a117981f4fcb64a498a7
SHA2567c3046b82c200ea8ef8ef307ac3c0dcebbbd7b127090ae0ca763f3225839cdc0
SHA51236e539ba34af8bb3b16ef6c89f8599b2afa0d4e813f9cdce983fae3ef7e74ca8cdc24afc0b4e91463007f66ae646cdf5bd7c2fb0d6c66f91b9adf4e4cb8485d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5598ed9593c95f2524982c773c055e4a8
SHA128447d67af5bc98bfe60561dfaf5fe253847219b
SHA256d6af29ae177226cbeab559d72578def5ab6b936eefecb9b12048f5bafc8c0ccb
SHA512fde7da6fa9dc7e25df872541e99c49ac8bb3c7dcf8e502c7d121c6665575400cafc39e2c0830eb20d0f2c446282b9d98446ff2b99c1c6d93848e170cabb2010e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc332a1549460d0da3a19618f3efe72
SHA192b0c54781a3000b8085e41220a103ea44dfd1f2
SHA2569d666dba3a5bc57ad471bad6efeb4ac7cbdf1f7dc3ea24d79bb381093a02034f
SHA51210888b77b6213ddc17b3589d50d98e2e465f0d12ca53fc760115157a96b23736dabe2e402740346123eb2ee9903d1bf0f7267b7c8612eff98bb31e33f6344874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c689280629c64110e2e9a310476e96d1
SHA1ffd1a0a6171be7fb3a834f6bd07225af5fb41d16
SHA2560a3f2524c998dca2eb04e2258c933b0a1a4bcc1d924eba0fd8145b003cb206eb
SHA512164f0b487f3bc3a3653cd0c313195f64f461f159501b70527751ae117c88451abf3fa9890d76989f89656ef2cfddc706e53f97acfed0e61ac7b3f46d61eb0a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e906e11b9c62950a5bce57b56f7e1b5c
SHA1d89944b6cc84f81e014e7fd9ba96cb4f4508ab45
SHA256a186fdfa893fec0006f9ab7732c031eee502bdd1f3dba8518e34b198045fb236
SHA5127f5b2cbf9d2b283154e44de1a345698034f0eda996a6acabad297bda7907e744cd3e0c44fa2274849d41a3cc4a72245bdf408621d9d19dcd550704ea82b8cff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5366db3c419b6475b2213aafc29197e91
SHA14abbebb5ca3c50df44f71e79549ea8a53925dbfa
SHA256fe312d46c10ce3276ae75dd345eb5141845375b0e69b520324a551b75675b26d
SHA512c57e15b18824f6754824881f0ec5de68c77fc620e0e5938a0cbadbbb18b59d99b3412e62aa17d2ec4e747fed291362d8d3ef1b088e3743cafa265045061001dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546cfdc6341e3abe23ce35ef8215e41d8
SHA10243d127ef811f460430d548660e03780ab2624f
SHA2565d72a26c2e89084cd75e0d505bf79cd2a2a62cabc486a29b88de54fec057c297
SHA5123c5297595383201181eb343bc38bcb164908be7e1bc437f6a7c754a5421b04c2b222a12159b31485a62f5e62d30a52a4a56ddfcfe94d18cb062937e10f7c55b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ecbd49ada5515d43ad6c3ea94c1234
SHA15af2c8cd6c5d326886486e284937e234cbdddc77
SHA2567f8388be7a255c3a3a86de0984a555f5ba56f22d6cdd012f3c7d1892da601da4
SHA51259ee66a8ddf783ed97c00aa4bb27659a49526894912f92e169321cf0fc705d8424175122cb504d8f8de7616f7ca1fcc7b546555f99568c95b826ec4c5d978880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0e115eaf8e14efd4e01357b585faff
SHA1e0e8bad8abf72cba1bd5c0215b456e8fbdc6f9fd
SHA25675dda85ef54b24411bb8dea2a13a1c30ecb1bb744b6f4abe76976b87f73c7bf4
SHA5121b4a5dd89aeedaa4ea09a4d73a640a270d1ff115f95145dd9e30af8b50dc8997469021e6b81ec47d3e404c8c2482695ec67b07ad179bea793caa99a1c8e599bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d4b8240070553a04ba5ea1ab3e4973
SHA1c53b26f9c8474a07dc3f80832c099418bd33fa3c
SHA256ccdc3314620b5d137463bde72fb35003dc7884399a6ace2b81d1f93a97fca075
SHA5122e2383440b504e817c5dbd491d0f5bc4493e5dde2c603a189979065c4f5dff634cf3fb20e63db162bc5451375160d6fa0379511438bd4a50a1e33aa920c01a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53daaf1b0176d68ee64e71acd9dc3c696
SHA10403f6b4a86b6136a002a594118fd640ab7273c9
SHA256476c7158b48b6b3d56ff6ec2c8c09debe5998e52b6222e81dbef9d88e95a7dbc
SHA512dca574daf4a03211615df529e48ba023c727c7db4b5cf87eb03a744b65524ca9a1a1008fce1b29e53bbff95c4852c5c6d24fa9f0a29e789aecb8c5ff3a881c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560d4d42fed79a53f05fabbb01761e5c
SHA122738d0a3be7fb0fe9e4e7fc51e4ac4cd30da426
SHA2568785af0a8a674078d6a67cd5c78aa65aa3a716131fd56fe5f3412a015a175822
SHA512734991726df5c20aef5dd22fe6cee7ef8adb07b9b33aff72cd7b08cf0650497f13c790561e3ecd5345007860d4245fa4f5f74846733aa3b3231efc5d322f6172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9208a54f07150044f97924a6e224e8
SHA10490e614dd206b8fdedc6eb8c684c5f2309d1b76
SHA256eeadbe53c8bf1176577c9ad08e55e446949d9418f8599b5824b927b9c5c32719
SHA512d24b234cf3e06a6b7b30cf411bdbc5bba8ff5692fa1325a0bb054e7574d621f34094bcee31d26f1ee2d69c41acc09f6449d6cd45dcf95b0446af51d6947843ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52607b9d24291cfc2dfec669a8ee8f6ba
SHA1980293e449f41a977906cecda1bb59525015a0f4
SHA256c42936414ece84edd74e08bc13af509c0894dff96f690f0571690b99ad29efe1
SHA5126f63e501ed7e49b79b9d58157de1f82406dad7a967921ff8d5f9d4f964f0c460e8b638e84f8a495573e9146167a3e981508dcd5175ae7c87ec8771a241c505ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b