Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
ea8d21f0eb9b622d492d571887137908_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea8d21f0eb9b622d492d571887137908_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8d21f0eb9b622d492d571887137908_JaffaCakes118.html
-
Size
847B
-
MD5
ea8d21f0eb9b622d492d571887137908
-
SHA1
16f08011d74cd2f7eff65c954a2b99571327ab28
-
SHA256
dd58cbe65e6fc6a40ca6a0f281b75d47a66cfec8cd2352d4176aa7d095c0bb69
-
SHA512
e62fc51a1b5b72327f9113008743a1d32de43402035358d49f012071da18df7425d0c9cd80bef06b36f646733ba01503920eedd13f83dedb988a2ca7d5e30a3a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880462" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000440ddcf34386895c99628c967d5d1d2fc2f80ffe85d515d8d42cc24b013d8245000000000e80000000020000200000000299e090b7fea71b1e35d2bc2888cb8da351c13e662cb60ca2131f22f4292d5a200000003551f845a60093f933e6cfd0c2a9c4d23c5cdc4bfd8141f90aae53cd506008d24000000017c91fe7bdf3d3fb928870db1625a398eb98e9675a828df473efe9aad39f518842e520cd385406ee5d5f58c02f7b3f68b145d5fc9717e5234c6549559b5fe2a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17DD38C1-763C-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00535bdb480adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2548 2220 iexplore.exe 30 PID 2220 wrote to memory of 2548 2220 iexplore.exe 30 PID 2220 wrote to memory of 2548 2220 iexplore.exe 30 PID 2220 wrote to memory of 2548 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8d21f0eb9b622d492d571887137908_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150a5dbdd0055b4be5e3e0255961c2c2
SHA13b3ca38ef8600c1bb7be94e279a37d422e7c10f5
SHA256d55151cfd89cf221dc03e156cb387b7d227a217ea09a2eae1c292e6e6a872d0f
SHA512b5d5eca2334f835a2d38468216d88d981d49c8683057e82ac72438f587f605d35f0c70113bdf29855196640eeafe0972b64138611f0dc7b0cb519d544ebafafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511bb578a58d35ad9172ef17036b1e5cc
SHA13a268f8466a23dd1cc0ca8d9b93a9420b860b276
SHA256f0ea8b1af0cb2e8d107d0bb2678d43e303921b119b900c8617944b67dc71c0d4
SHA512ea712a29bb51458218c7bcf5c18e11ab9be685c9b7c14b834f7fc52e31e678d687a2533ae0187cccbdfaec9d7eefcc3444995086aaa90e09a2d636d264be3d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fca783bb9845da3502a4b6ad01cc19
SHA11b65d4b4fc95c60807d50ab2944db301ec8c54e4
SHA2566732fe34418d20cd2d1c8018fb60fae351d8e50c18c7752b15e20cb237e2511c
SHA51245289e7697d0974c764d9834796df41593561f6b948e15ed24fd9f086f8ae3c27e43d25b4f1f9859d4d1c0d4a0d18020bcab484b51b094577fe5732955717a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0eacdc18078bfcd79078453cf4cbc74
SHA139c35cb7843805d10e11a4db687606dd0a473018
SHA2561585595b465a7157b788bdc2c061b1e42695fa67ad28cc8ea109c011baed0785
SHA5125c77e9e14b39b18c0ee44dfb3c3b7c985d920c62da77080a3195c5885b7b20cf1e338e41d4af8599721ff00a514c2bdeaae4218fa6509a872de1601d67c4307f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536918286ffbfad5aedbd6dba3f732e14
SHA1d4a8fb7da06238232d7b606a4e992394b775bb26
SHA25684375879f57a8f2e01395ecb42cfdf73a757b3d15f081c5b56e5e420cc745312
SHA51299c3f3d476a793a405f9357f4780da47aab1458bed02e7beb2c14345eb41ca45e764d95877d689f6ac2f684299cbb26351a46a836c19b096530baba00426c8f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a928fed0fd0f81932de2b79da40f112
SHA136e7e9c505ecacb650bba03cc2eb35ebabfa3ea9
SHA256c8315a8d2cbeccfde989f44407c3a6d96a8080d7cdf6bd16fb0a77dc8f649ed1
SHA5127abc908d4561fe39e324997a3b29de6bec5a27e19037864c64bb8826273609e6df76f2a68a2f9f48c972e014cd765df6dca798d2de0106a5e2691ea65e1deaa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594137fcaadff50c0363c9185090ff67d
SHA12950c7599b4f3239017c99fc4301533e0ae7c7da
SHA2564c6954ec0d6a7a3d81b0f94b77a461f15791e04437c24fc14d065b356110b7f9
SHA5122487b415b65721ef98fe51cf7f70193d9d292852b9ab6f29ba9a8b9386a78d39e428f1aaa757f365ead04cc24a7fc3158074c125eb20934a15903acbdc99b10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b73e92caa259ee33b6dc0a562d7d494
SHA17ef67c21de434996265bb1de29fba5d41224522f
SHA256d58001cb27c4f74d377e241cd27f428f24cf74f314f1f7a410329dfec7b0e5e3
SHA512d76bc5c143a02ebc45311129220bc30a52a5628cf10fd8d5f4e7efb94067fb302d9868a02aaf9a6a33b3f3a0d2e724f022226eca931100b529f587b9dbfe195f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e70358c23e583b2fe89035f325afd9
SHA15b2c796db6dbe9eed6ef73c2da69b069b114407b
SHA2562e4685e9e9dd440eb4ffbc79d5c5260a047f032a9701a59bca3cf27bc64ca56c
SHA512fbd734ab4c9a4c9b53af0e5164b0def5152cec82c387976a0d2658be58040e5615972c8872fb77dc6c77dbe2dbb5afd68fb5e2dcae16ebcd98d5d0a16acd6d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57819784b47481834130a2ee705f2b29b
SHA12561290f861e6cdf520b1a09d53bfb75b826be4a
SHA256bb0441aa71d4eccdc305c26639fd695c671c2d142324680e4fa447cc0bb102ca
SHA512e02dc004f3c31570026223716da4e9eab9dc836f3307aff0778cb0d5d811bffb90339aee8c8c3a2de58637bcb418a98f723671df421b7ae8fd2bb1821efaa083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4aa012c4ad0038542d24898d0ad762d
SHA12ece50ceaba875f8a708eb6937eda8f157d156ac
SHA25640bfb7f13e4c4ec14daa1e48f4364dc192a1c39304aec85385b47712caa7a4d2
SHA512eb09653ceb0d61e9bb5c5bfc333151c6c2cc119dc640840626d377216f4f03b7af515ef3875a2f989e964461bbd5665572a60601a7b703bd7cb175ca8ff7b23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9eb930c6d0c99e053ce9a66590afbd6
SHA1e1ea1583bf8b6d918be2439b9e9ed5ced2c6491e
SHA256874240d759d346802ae415600b6af155704f8cdc858cde3b5ad9afaea0884f2b
SHA5129f6517d998aaea37f86f78b92e8bf503c8a897e8b98cc51875d9d27dc4030a1e7cc99d7e371b687fc46a85ef245afeebef8e1ade3216af7d8dfbd74dd311060a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54347a3e0977aa6cb8462cd59db083ea8
SHA12061272825969d84deecfa8b1a35681c496813a2
SHA2563443f38c6120de260a9d89ce48ff199277ac41e9092090883a063bf8fb56eede
SHA5129812d956bd14f81fd7fbcb86974a2b57078efb4947a9cb4dd1be2da4be59d429de08c82674a80ded28afdebe4b4b1431496db667ac664b8343a8a889f79e8dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa58e396d15b3a02a72607fb04ef60ce
SHA18074f000cc955611f0257df0f66639e5d86e2a7d
SHA256e0094d8cf2c0dd342289980bde31768721e8975e67895f2c5c589fc65b27f08c
SHA512e99e2c39faa9cefcf7f7227e7cb820627c8abd39a19db31f072cbf26e5907ccb9d4ac25a37f73b3ec4ddabeb961a7406a9b29124d877c2ca4af0038e1170474d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec64f844448000275a83db476554585
SHA18477115d7ad68bc75f609a2e0db27a695ddd57e5
SHA2563ac54b997f323900c35f1a8b766980b253524e4a6d598c370b15155d6fe67662
SHA5128ecd9b5e03d0228142eabb107e02e76ac49bb947cd1d2499f68e200cddeb7c6ab45818318cf703a594039f6e699b40c3121bf309b4f0596c9942ca5e8d76391a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53daa11d0331cab1d20b356bda2d1d5ff
SHA1ce22b6d2e26b81740f67abd86973cb5ec38b8be2
SHA256aeaacbad4cd1512c07b30671e47a7751549ff6c362cc64c60867a80898574793
SHA51206c9eb1025ac62c175b50f4c71db6c7d276d32bdfb21734057c25f9e53a3077d1117ea07be4f39fb97bb5f5a6c27dc7c26f883a710290fd4a81723a5339fcb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b010a4d0dfd827aa974fd1482e8ba3f
SHA16619368723c8affabf71a55c0eaf7d2dab6e201e
SHA256f744802651781e6a1b4e92863104481caca9f459bdb37a63c983b1eb107f4dc3
SHA5127ea5aae7317de37854b371218d8107aeef83880dcf9b30f6d08b09562f997dcdd788a19ae80dcfdab8889bb3208d6fde4fcd7ba59b8c6754b645d1617ea2e3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd5efb193376dd3c6cb2eca15c01367
SHA18ae1861c453a305032ea4b705ca80b2d28c322a1
SHA25630a67ce2d384a029c4d43fea5d2aef3bef0fe80e948a826260b15f58bcb403fa
SHA512263d9800fe3c65affa288ee9f94605220cc66832a12abe47e3641039d7242636f25b97b3e9a7d83c63bb0bfae8f66dadff6db6fb1952aac341f5c5839b93272a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b