Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
ea8cf120a36a0fa7fbb42f3e7c7ec3ac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8cf120a36a0fa7fbb42f3e7c7ec3ac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8cf120a36a0fa7fbb42f3e7c7ec3ac_JaffaCakes118.html
-
Size
53KB
-
MD5
ea8cf120a36a0fa7fbb42f3e7c7ec3ac
-
SHA1
f33b4cf4b6a9a436bbf13c305243868402e09731
-
SHA256
14ce93e019cc0227dc754f50ae927c003cdc042253698b3d76c8f2eedddea3e2
-
SHA512
ec68f4217844b6476ed8c4fe0a27c86ade033b339cf9fb778053dd6027138993268c75c31be302188ff4e87a2e574608ff7dc4281a5d2f02560dac3df7ffc908
-
SSDEEP
1536:CkgUiIakTqGivi+PyUUrunlY+63Nj+q5VyvR0w2AzTICbbMob/t9M/dNwIUTDmDs:CkgUiIakTqGivi+PyUUrunlY+63Nj+q2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880443" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000b86f3242d1a61fe69ca19ab2a75ae293cad7f1e48ea91538a444fd99d16073e7000000000e8000000002000020000000fe740b5c8b3c9cac4f65ecc6a912a11dcda7ce39c5690cf73795d76430025f39200000005f9070236c816330600fd5d2894d17853fd26550508aa3d96dbe55f115cc7f9f40000000da4e5b53d6b661318132043188db63008860a0ae2972c8e61554f5af8cc8b001e8dd6a12595a735376051f0b58695f6672c8850463ab30a8363c7034a750fcd2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C93F081-763C-11EF-9081-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d87de3480adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2104 2272 iexplore.exe 30 PID 2272 wrote to memory of 2104 2272 iexplore.exe 30 PID 2272 wrote to memory of 2104 2272 iexplore.exe 30 PID 2272 wrote to memory of 2104 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8cf120a36a0fa7fbb42f3e7c7ec3ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed95a83856ef41989c0becb73162b6e0
SHA1e3cd7ebf41448496649b26b272872f419774dfd3
SHA256e25c1af11cd990fc2a11d1161ac905cf499ba19375b6d42e526e9d28e5923623
SHA512b4974798270a9d327815e41ef1cd22aa4b07e5b6749939f3c338346edafb48578168df521aa983becb8ab1c6ec5f527c7aaf40a87c24ac2343bca3a6e06078ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59056f911f0340757c291376041efcfed
SHA1d53d172eb2475e6037f6339c6bc796f26b3d4548
SHA256f63a9051f4baf77ec223a9074366478e85f76261353556c5f19d24ee7321e439
SHA5128d09a5e84f446585b7c266b80caa03af9fb5a403e9ee2471ed38f0fd46ebac25f6e768d8ca3362ddb970a20c48ccb02ecd9c5e953a8a11b134bae56f80d77ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9ca743e290806e3db457c3c1cbcd45
SHA153a281d34cf677135627a6a747174f15731bd979
SHA2560975648a0ac601dee8a1aa34c793f6eb66bca9b3f1c805e77e17b43472e9b449
SHA512d1625f6c478e20905827b01f4221bbf4d4c331fdcbd384af5cad0e9c43ef3b6b56ac1540e899c28eac61115f75552dcf30c0c0001f159a8347f29c34fcee1b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da144174abef853e224a79eb01e7649f
SHA158f03a0d2e6b9922e6eb203506bbe4a0271d01e9
SHA25609c1b3e5bf9d3a0cf4d7079aabdd3be02296d26abfc39b554dd62236bd5fb982
SHA5126fc8760f1b2fe2ea087cb6a2dca71ca6cd3b7efcf22eb6ec3ea5070a3b085c0f044cd2b720319746a1fc00c6c00230a56aa60e7b245bd68429663349133f2481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5371f0ff310fbbfa83d294c63daaea683
SHA1c3b2ea1712d61adc3c6671fb246bf0c3b17e0418
SHA2565611e8b641b91853a75ddf5c390f01f25b1cdbfb6042fcfb930787a95deb529d
SHA51249d03ec51fb882430161a2f49a8e4fa65ce668b8da968c9dd3aeb5d11ac84b5ec2cca1c0a6176a02e0a8af98d721cd6f13a95facf187a7e426fb3a45d2621e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524adcaf4e04b1e19c92de8905f3db23
SHA14971907d70216bbbefe5332acf868996e25bdbd3
SHA2562b2354f041511cebf7a3537fb1699147253d8744179efb43b36fe09764215a19
SHA5126bcc87fcd0de54d69c18a71d8367eabaf4e25e43f66a5c03bd6665f46c7f6584f9c59550e78173b993b6d43f4ae725ccc2c7b54f18d04dd5d4dbf1cf9e6887ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fada8ccd5c84ab0356ae029bbd51a302
SHA1035b7bb359944b1e35baa9f7518605f80612b8c8
SHA25625586faf79aa422f43c5972634450ee808b04e25842317152615745a154cace9
SHA5126030b17d59bd8225e3624edad4766e53c80dc9723233b1acd3eabd312ea5ab2fb9915a63d40ed66becc7c0a902a727faccd260bb95419fc038c421a200f40232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57400044c1050518514d8f6e4fa5f0dd4
SHA16a02f1c10af1af2dac0df205a2de7f21709c475e
SHA256e9fb8f17790110d7d0d0a5826e22bd262649bb4012992b550f1ec52ea61de870
SHA51249fe98fce69a58bacba10dc14ef8a9f0dffebdfe88b284304962b0da9ed01803cf46ecd791e457a99ce33bee4373eb9d831b7a3a15928bd1ba6edd71967d89ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b1009d0b82eb70e797f0b588204419
SHA1fdb26493b79fe0eb8f06f47ef6113b81f4613624
SHA256eb6bf78771d8ca00f27e8d2b7b3b7b509c9a47965dfe42948f78edbb74d0c1b2
SHA5126097fb47a882996b64753885b34eee017da525de160e16d7cb5bfa604d8825da22cd24bfc369992970e40917d6b4a831bf5a0bbcc5468760846f266b41590bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321d0d84bcdd898ed2258c6ba6f50cd4
SHA1d0817f27bfc5c31cf46e2cc52ba696c5b06bed58
SHA256f75609b09503e059407ab189478adb851c47d125b414d4e73612a556ac3de96d
SHA5126f96475f78840006e306c23765adf8cdf87f846d76f043f1210896361b7c026dbc647ea74fb6b57183327f9739ef04d461527c060e0092172c33b373c371c627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34324c615197f28429ed9bde8e1b85b
SHA1a84c7a3f6950381bff1ff909cb50455254ecb206
SHA2566b322603d9ba0cfc990693aa284131522e58e6bfd04005cdc267543ffecf80fc
SHA512323ec5ac37979f4506825c1e5075dde9c4776a0e4b7f796892ffb57d78643f68fe501eb364c9acf6d026ef1a81ed8a90a8f9f5ed913544f2d58a75948bb78229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596545cbc5327bc2104d36ec5d687b97a
SHA1962547038c8149702b466cc18f16d3f1db768e10
SHA256d15a220db3c7ef6d24adbaaf78e561c26abfe1c64d0fc10cb945f52912afd94b
SHA512c2df58a6c583c22795f7bfa9961694f81782695982b595708058a2b35f7d98fe761cc8030cc7e13ea59eae61002ad05f35e2b7065575f24bb50f3abef58c168c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82109984bc740bface654296ad64efc
SHA1baa90cac0d7a6c6357ff7e2fb91aa3d6bc641e39
SHA25683fd5e07aba94374d1f639061606e77a91bcdd3956427ad86d078672a4372787
SHA5123c277f41a7f85d1de6aded92f186ac1db2290de05498eb97e88d47ec18ad979f7578a4428bf2fa0d23b98baebe0e20c87270c37c075aeb0edc90f24655049a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516c9b12de5bf1a76f5701087b7c2774
SHA1f9e60a8eb3d695a98c004eb31bc87c668872fce7
SHA2568be524bf7be4366a5f4d8bcdaab4da9b8f8a384bf81609f395af354c28f38cb8
SHA512115a3bf15c7427d7354643afb7cc73bf0bf46d24bc5b7082b055888deed998216a40b7665f5aa4df1e501c1349d7aebc11d65b3055c17e43d460ed6567a3a8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e45cec9d3997da03df6ca4c8f2a9bcf
SHA16047ddd4d71b62f1ce4086250cd2c7119e4e9598
SHA256b90f5d997d638a68cf396049ee7e9777db9d92c3d881528804aa36e9f0a35c26
SHA51248f47cd5ec7c855ecdfbdff58d38150a3d727f7bcf4e30767ac2d14e216cb82b965deb6f65b951addb2565ad1fbe4b5286e59f6378663be07314f3e772be19ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea00e71beeafaae547fae5f8809e4a7
SHA140af13db9dbaf24c1df3579ace4c06777b581e8d
SHA256bcaebe8fd4c8e3e997cdcc7710a7c1a6fea3fe04156f7158cf60da8c0b18c0e8
SHA5122b9b218d81fa3d1036e0ed45ec41aa5294cbd5c453d949f8187246dd1fc3d33bbd473e8f611d411cd4d6ed008c177aa86ae1d5498f7c8d60f66180b5bd29c0db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b