Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
ea8b6e53619fb3dff8e4dfa7bc660f2c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8b6e53619fb3dff8e4dfa7bc660f2c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8b6e53619fb3dff8e4dfa7bc660f2c_JaffaCakes118.html
-
Size
30KB
-
MD5
ea8b6e53619fb3dff8e4dfa7bc660f2c
-
SHA1
52188396f03e976a6e7e136fb64f3f8fe96e9fb3
-
SHA256
1e55ef8c1ebb69318fad052be3449e746160982ad7f2a55e2d929da0ff9ec91e
-
SHA512
1baca0a87cc5bf0f337e59fce4bebba85cf9dbb7153e101ef389a2530d4c3981281fb0f2348cc50d0f1476308861bfa295f973b3cacd10101666b749e4097fc8
-
SSDEEP
384:cDYhPhPmHLteubcq7Lb60kYQuIfGdr94RAaIgcKKX:OYNhPmHLteiFL+0kYQffGd54PfaX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880241" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000fd4902fe2a7bc5639951f9339d7de459a1c4b5d15b54e9621946e218258103cc000000000e800000000200002000000055b8aab2d7f308af4bb81b52736aa14b562f3a7a519389bbcb138a1373574386200000009e3a75c2a742d4ec742b13a14351e0c67e014f44f3c4747abe442c3897b85c3740000000e43662518c12c5d2fb657a4feb0407517551c756f6d0ea0132df8b740eeccb4080fa336abff61c06740921e8ff29d61c53e03dd449d000d897a0bbd27edbf841 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2011ae69480adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{943FFC01-763B-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2796 2640 iexplore.exe 30 PID 2640 wrote to memory of 2796 2640 iexplore.exe 30 PID 2640 wrote to memory of 2796 2640 iexplore.exe 30 PID 2640 wrote to memory of 2796 2640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8b6e53619fb3dff8e4dfa7bc660f2c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d0a64be96c56261e0b1093b08d4637
SHA1feab07d36a41731007d1cd77aa8bcb7b55860e61
SHA256d4acb5cc10b32355e64eae83ab00b546c3b08ffd3749a07444005b67c14ab7d7
SHA512e87b6b8552013ba1b9ba36bf1131d41cb1996d9ab88cc74f5a310e494b69d93a5c756ece61a87905e317dd9205d0f86062670e43d567f1199d47a9fcd62c24cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea3f838c14ee6b64c8f424653a39dcb
SHA1021cfd94ba1616655c316bdb4c048c0234421916
SHA2568551c0b56c0a66947cb569f57edfe442211d3546abc98a59f0d8f5776c00089e
SHA512352ca8b402c12d4c95dae313e86d931b560a15fb2102e2319e8677d16abac4b19262ee10f66e4412e924b238612c9ce756fa49a111eb64ed1c2d9cbafd5a1575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b70e2e67c714f0ac2465384668410c44
SHA108f3e36527eb834e26d0b355ea29f8c6d914a8af
SHA25610a0b6c805508a0f7df103ab2d7bd9183de770f12c14c4c76a67cff2a176caa1
SHA512c14fe9b95d17a6a5918fbed1fdacb79c53a65791a9abb11a86ce46cd3d759335638151c7724c9114739aec58efdcda1b289510422444cf218924f9fe460ce69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f731cf0284ae2e9a8716b9351616cbb7
SHA18e2a24b03b61027ae7ead5e65ff4c4cbb602c889
SHA256e857739a303a55186ce0ec3bf138c21c3444330e486105e440a20aa8b7346c4a
SHA51293727bdfc7c69b0238cad221cd664fd2db327f124a48c5a32b654c0c04bfa1d6d3277a6f776a0a1a1a51de62afd72407d9ea4a5ab653835a702347a4d9803410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac876733c433cd8c8f496e4e94641ad1
SHA157c79f849af0108d5be4f05421e75309cce24d04
SHA2566b7d5ffe996e72eed17e97f6057a27a6e1f9cbc5449507d50415c442155d2cfe
SHA512f6e66d6acb903899028d1b363391d901a10ab13a48fdfa36b38811611d60d2bd41e1d4c61768c2ee3c3588683ccd76b2dbe38f95850059f85ccd50239d5a2469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f98db5231c18c2eb96387348b85e56
SHA1454ab57d9a6bf2dc4e7ea42b2a1c727fe02eb931
SHA256bf258ef0413841b8ed56bd4ae79636f61ec3b14a50ba49f7e9216be2b4ed7b03
SHA5127ac6e5363c71f665b13dd88d8f3411243955d627be256dbd45069b31b6ace766352df62a5e2c9bae8ecacff5eab8d04ae8ee585358715dae4d6c053b1537ff66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5113eb4e173089f6fc82abdc7fce75646
SHA1a49c86f35a0230b99fdb0e368858a24e0e19dc41
SHA25616f5b7a4aa6f8238c47e9187caa86910f0e7862dc6a60a9befc82d9a7092f134
SHA5123fa7311b988da5f17d8bee3923ad336e4ebf97da6e6a55e685d6d18cb6e3f338cf75eb046c85c90226fdd199feb5150c07648315bd7f234e108a3ea47a5b7c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559091a5f358ba0c7466a2f86edf42387
SHA12bf1704d8f2d21229a5365ae074c55e952e45f6a
SHA25689b9fef7c236dbfa3fde31ebf34c2bb75bd438e8386d4ad2fb1c5e51f20e131c
SHA512b4cd437cae881ebbd8555de39522abc6135fc950ea9e62789d5b987ec7113848441812879d7608b394600c27c01d338cd32346f157d973796179e2e7d87f7422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c293a2ae836ddcdd17fb067005c10e44
SHA1d04b67412ca8bad7e22533b60b81cec7b7846161
SHA256b95d4867d23df32ddc0785973a83f197564f44d14c2697bd31921c97aa8d7f9d
SHA5129abd2c70ea400a77e1bcbc5a8334e2cdf7c1e7eeac1ed6221a3d5dc2bb395cdb4a1856d3ea646b7bb3d4f58c81fcf34ff1e6acaf1afd302f62489e09b4944b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4df37379b4cf018493f170f3e327492
SHA1f82237e1605090aacd3cd56bf818b735de9b372b
SHA25661a5ed18abf0648b455956c420a1c54d5ab77531da249ebc0e86a6bc4a01ad40
SHA5128fccc1760af9d675655886a0ac6a4780fd69265eb1340efc15b9126b8cc14804d66fc7a476bd0e4d17384ff12c0b466c6c702764112a84abbb58760e9d8af6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f37119c112b0c501d431c7ff601e3e9
SHA16d15012857e5e9b3bab2c800f4dc2272882d6f88
SHA2568b3da7ba176332bfa2bc8d67c91d9fe00fc86be5e8f106e2d4afc3cb33144efb
SHA512e4fb1790dc199d0ba4ad8f6f6397b0e37afbc255c797fb496354017c462f688cb337a4a7d0cf2727f712fdfd2e1c54172a30b28d276a05a14f79ce2b59e6bc36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee96ec9fdd3e5f98b0cc0b61de224e2
SHA1e817b98cbaf98eeef6873ad5550591827775ec27
SHA25661ac4b7a960d2ed95e84a93a3409c074246e4d49824d78339965bd841715a719
SHA512250836d780c389a1e69d3bc026dc77fb635b46e5ab33f9f3e5d93e2cd53a83d431fbf966376e65f1f318437c4ac6415ac559ae148727be6e48e3444366f2b373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f57f2338fa190a3bd2f1b61052dbae
SHA1c07429081dfb7067515b7830a4d419f1c360e394
SHA256b27ae8a13c0692623326d7da249d78a1495238c494be97a082135327cbf205cc
SHA51298656523d2d10f13e86e2075558f64277e24234a71af5c18e9467d92d5916bb593c1ea3b3d78ece95c6765e3b9d177c8efd1b3c74d85d37652df866a76380bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b66b06a3b5fbcc502574b54f813a90
SHA197d323472934d6221ef46bffab5cf662a53cd89d
SHA25631180cba2d88f8233f2021d3bfb54c25827aeca3e979e5d0e164b63962c5cd2c
SHA5127fc8c7563f0e830922a1b26f3683a53b199638263e43bd217b02b692efd7da930421ec504f25e14b2eab233e852a54449fc342238470b88f792e09a4ba650544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa1f4f565b6a27542ed21cb986e4ad7
SHA18bb199f62f7b3f1420495bd657327ad7d265ca99
SHA2563afcada9d061e18fa993134033ab67a44b677e0c5218c2e7e6eda75513517f2e
SHA51201569d6880f172442b7bc63601b83a82165c81d65d1e2bbd912c47836ba6979c20ffc23c5af0dbbd7086d3eb2bd9512ce2379d6dcd72e8ec4c223223e96126ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\2254111616-postmessagerelay[1].js
Filesize10KB
MD5c264799bac4a96a4cd63eb09f0476a74
SHA1d8a1077bf625dac9611a37bfb4e6c0cd07978f4c
SHA25617dce4003e6a3d958bb8307bffa9c195694881f549943a7bdb2769b082f9326d
SHA5126acd83dfd3db93f1f999d524b8828b64c8c0731567c3c0b8a77c6ddcf03d0e74ee20d23171e6ceac0c9f099dce03f8e5d68e78c374da2c055973f6ac2db4e4f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\cb=gapi[1].js
Filesize66KB
MD5aa012028297a26c039c37ab25a4bd17a
SHA125f23d01b5f580c00778e1c010225e5b8c73b66c
SHA25655cd2316edf7159b623e4ec2c9e3a334027c01e2d1cc386f833ebcd35ed87b38
SHA512d346eb082674fc26d562da9a12f36ad2cc7db1f1b35c891a8734284cf1bd052a967137c1281982070688b2bb2e06c7f4967d1c9397311a31a11a8560b9c45fd5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZOGPI1N2\rpc_shindig_random[1].js
Filesize14KB
MD5e691b2e17de9ec018eca758518bf5dc8
SHA13238d543acf53b803dfbd260405fa558717daaff
SHA256438d41bec769ff386a2c1555b6bf9105362f67dc3e711c81c6092ee7fbf6ad2e
SHA5125589a5cb408ee8e0fd473de24224ba8fa1453eba5df6e591570810f992160d4f3e8f60f8ba74d9994861759321f5bfe0c4a608636913a8407b5184008457afc8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b