Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
ea8b6f35837821de3fbe42e2de9bace4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea8b6f35837821de3fbe42e2de9bace4_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ea8b6f35837821de3fbe42e2de9bace4_JaffaCakes118.html
-
Size
40KB
-
MD5
ea8b6f35837821de3fbe42e2de9bace4
-
SHA1
a8f675ac1a3bd0fa609e0dd2a9bc778796588e0b
-
SHA256
4191acea7cabf4d6d797d0937e7b6c04dcc9fffcd6aa19e1eab37a549084255d
-
SHA512
8354fa683ae04dd0972d3e6f0005ec67d217f36985750583d5dbb772e31f73ed960d190cc95a9e0275740d1cfe11757750fc7cc5dd0dbeb60e7acd48a75b74dc
-
SSDEEP
384:SI88QfTvPN6zO+9cy0ULvpUKQE4AlZVL6iswCs4w8t:SN1fTvqmyXLvpGE4AXVLLswJ4w8t
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e1726d480adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a7b85fefbe3fc3f16f2e65fb5afe24d90b9e6531f1adef90f5b163c19c8221e1000000000e8000000002000020000000538b550e100353e45bf83f7511f8788409ce62c3236b2d3996c3ec5db71fd787200000001bfc5f341697c043d3cf9befa581d9e34fb51d310320fc8bb304e52f126d60064000000006930a0e01694adf71cda643e1c98e43650b69630b20cafa9fc7083be699b2b4016e6244f4cb6fe247a378b5ba276e6c7c533066b88309a2be96a2fd339475ce iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94C80051-763B-11EF-A748-EEF6AC92610E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2076 2504 iexplore.exe 30 PID 2504 wrote to memory of 2076 2504 iexplore.exe 30 PID 2504 wrote to memory of 2076 2504 iexplore.exe 30 PID 2504 wrote to memory of 2076 2504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8b6f35837821de3fbe42e2de9bace4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50398a7b6d088aa147387f551c8abd4b6
SHA1a6b7a22d9564e90713a6aa6d9a44a0234e3e67a3
SHA256e5339748e37953e91c95534ca56e1b36122881fed869014c97972cec50a0e678
SHA512ab4153c536c6a6b21409c5974ba725854131150a89ac6d31c4d2181f8b8314a8b17a4d5bc59fca5e79b30465a5936beecfbce1344fe0330e72f84f8ecb277d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f8be52c28804a38a8240af675084f4
SHA1e65d8eae6648d54dae550e6850406bf75286b313
SHA256c7f65f7b0db30446e6a2d50793b9984c3c1f4454a4b693b1877a0bf392e12d33
SHA51295ccb974b1166ed44a2ee75b0ddc096356a8fc88f1c14a316bb3b4be71c61236ec9bdfd7e03a522d0891e58f737654dfd06f039cdb1691b43abd836f2b0f500d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d70d6be4810137ee7b9048d446cf707
SHA10d92f020cbec47b488f6dfe926837558f091f596
SHA256d970682bba1b9bc8463b84cfee0ee16a21e2aef43c306f9dae8b1b7de7d530a7
SHA5126431bc720834a49989d35d3b6898dabe475b8d14a0eb79a0345658e22165e7c4b08174ed14269a334fc5f7cd056c3b15f96a4cde2bb235b76b8ccd2d192d5ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee22510567a5a386a32b9240d3b2e28
SHA1f594ee3e4f794556ebf35b544593b22b4f36c95c
SHA256de15923941add4dc970a48ed8870bdeadba7b14535b791091d5bff61efbac2b4
SHA512ffaa38e2f480ff3bdf6667e5be601991f2d8ee3bee6d2490c1c5cc3a25f4d8aadcea0df6a06eba34a870bbdb30b128a691c328132f07b96db77c95a6ed2a5c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e55f2bd39e3f08a4b765d773af2713
SHA1e06873165b3b42929c6dfcc4331b21447ddc708b
SHA256bd2e5978787327f10c9df699969bf5bf3959895bb4884485e468e1eb19c3c3d4
SHA5123dca564858a890e154015a79d421e3e425f162e2563760ce12b04606ae3599295e5afac3ee7fb191d9ab1a34bee0a12e0aa99f75a3982f55ffb0b08984033b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59906353e62d6ea4dac6f28eb565d4544
SHA1067556b24b7fcb07e3ec9e5520b9ab4e76cecc2c
SHA256be521c797c427d28437e871149f3089cc2d477f75091a75da547318a6b80b416
SHA51256f3b38451df903b4276370b2299ddef7b9fff9c21a2600b05523ba32459fdcadbfce528781750cb4ba48c51b1de068857d3da71ae9173d8f6d04d52fc256455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581aec7dc7890ab76b7595eb496f0e522
SHA1bf59d66684e5b20790a65afa08ee53d081aed30f
SHA256588fcdfd1c665fc2e9d43a0beff1ef2a6c413758268b7efe6c3b928c10deb9da
SHA51200d3f43f2ef5e7e022a49bf4438dd65d9d3b3e4e25431b58c5c0c808afc3f6002b39fbda040773e212cb2ba72c76bdc3beb3cd03e176e34969258b85f03827e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9c80dfcebe50c364c5ec7df8f551a5
SHA1f6d3d32495fd39ad101f6e02fd3a57b841bc7458
SHA256fe1b38dbc3ffe88b4f6f26e1683ef76d14d45c5f0e322291b285e47993b32df8
SHA5122a1f8fcbde21ded7dbfd1f7f02ae09a268b3ae0182962af36bacf4dd95be1418f668e69440d70b8b7ac1ef783364379936c8f4627b56411f07449862db0e98b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58153ae13c415e6412581b3545b4eadfb
SHA10a54ece9760459663b4f9e8eba80578f57b45e7d
SHA256e3c07244983d21c30746d620efbf74fe5b3b482faabe397c91d034f393201e3d
SHA512a21e75f4accaef03c5b42aff210b3bced2d8e84ac8fe2c29cecf3587f54a4dd4200f1ee77fef3f66650908ac30308e438e9678630de1a87b5df4d714479e5683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6527be6040e2ecb50cc1130379ef0fd
SHA1c9860bebc5c082b00893f869d7b6472595d6ad99
SHA2566fc0fdf68c6734c45e51c35293a9448825b428ec89cbd022ad595972a6a50cf9
SHA5125a39c24000f3b3f412a1f6fa72d6afab8251ba573ad9f8b75038b0c04efa5997df22d9bf41630072962046c32ac4e8e755ad553eb73ac77aa979a2d8d23126dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55694d3cb417f0f2875daa21ebfa7873a
SHA1c0eec55b9a48441a72f56c9f7db8c2a6786e3319
SHA2561be25377e458c93a8781c169f1a0fe4ec6e0e91224b53a490a57e93380864596
SHA512c8884a7d0bd79a6f0ae931115b43793a620efa75a1e293f4fc635ea8d907032c1ba07dfb3ef785681c04a6c7a8c36a6d8283627b38dfc0f60e8c7a01d2316f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b804e3ff4854e923b57deebb22b6da9
SHA12adcfc69e91c1d31369f808fe37b75d6639d3653
SHA2567900f4452069209b1214e68d913af3ca1cb5b10158c9f05c6fa8c6b490be2e45
SHA512709f025b8786ccade054703e14a98dee297c9ec1b063c433522a7725668d59fa906aa3bb7a588070fd05f55a0860af617dd65e979204633016a2f59f2a86e013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD504e861bd41a60c8e62c42753c047c559
SHA1521b6c11f9e14bc8bd5d6b49890c0859497e00ef
SHA2563e589d3264d0ee0b43c6b9ea2c72a4d59a54987f65c27e5dfebf3e813d41b076
SHA512015ac15312a73936b5f519bc1f37154affec0ad0f2403741272e914defcb2d7c9e52f20a7f10fb62278b9c6da65c5ddddeaec13121108ba75be8518417170c8e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b