Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
ea8e0d51952326da6501a844f2e574e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8e0d51952326da6501a844f2e574e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8e0d51952326da6501a844f2e574e1_JaffaCakes118.html
-
Size
1KB
-
MD5
ea8e0d51952326da6501a844f2e574e1
-
SHA1
ff852789fc455a6e3f4bab6cb0dbe290eb25eebf
-
SHA256
65fe5d1c069dc4f9198197f5e1cbf4acd9bbb9644f6235a2e7fe7aad47fb5e81
-
SHA512
08206400478be08841b8a59da82a38b9f2ba934d4cc1e1a105ffdc125d547065f38157e8c649e25cb5347726ff3ecd90f9cb9b416a2287e7f431d1c64fdf9f87
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07fa33c490adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{679A6631-763C-11EF-A7B7-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d4f14ebab79b6de8e086c7255d9b204bcc6efe5a83c7d6f85d3496708fcfca1f000000000e80000000020000200000008ecaf1f960cf0fb9f368c4388e86e840f6d1ac53bac02e2c6dadd99bd94318cb20000000b4633c8315b0888bafe09c7c52c347db168be800a509df3ba4d2492eddc54f99400000003cb97e9513d2f33a130932ee5c3dea40e343d3d743927de7636c8a31d9c4418ec3baacd926b920a88b259445d47c00477132fb3def6523e94799bda408116682 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880596" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2460 2176 iexplore.exe 30 PID 2176 wrote to memory of 2460 2176 iexplore.exe 30 PID 2176 wrote to memory of 2460 2176 iexplore.exe 30 PID 2176 wrote to memory of 2460 2176 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8e0d51952326da6501a844f2e574e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9fb2b0d791f9113fde3fce62feddf2c
SHA1ae0ae1c43c97c648b49093abed6424ddf2f9823a
SHA25654433637c5c4737108bba5c6188fdbebcfe5431e4850f8a4691752fa3e3a5c87
SHA51215fb7aa2ec15b7ff9cd970ff912c582d3ebf8e0142aa8072157af980d5200e45d3c2ee6436af9d6cb4f822e64236b62b396afec1cd3f95a463719fe6867b847c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5fd47a9c047e1dc58df3045380ed7b
SHA1b944487751906864d90ff14bbaa236237f330dab
SHA256e5e3dfec2a709874b47f66b461a4e1d5f2e86c1bd4c6a3bd60d295e6a14a4c04
SHA512828aa576f91489fc7d3570c6b2c310d751a7295dfbdc54706635acb9191f65cecf601e2ec8b869c826870d9eb49114989997a393f820508f3e717ec1b89495e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3244f177f644af8298965e887154b5
SHA13f2c0492435c2b73ed6fa49449fcb09f23041ec6
SHA2568e27318b6a79dabc41c811b894512f8d7eb57950832785407edee899f278e5e0
SHA512a6f61e78f145be57eeb7e9d96694747108bd8bb266a9763a894df2f70eb3c81a163e1c95eb83a7405996c6784a13b0c53d17e2976cad676de71c35bc891c1756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e786ce0d0701b4e6731920af155e5d
SHA1cd3651dc05458468272828a761750c5dab4e553b
SHA256e6e329aacb0c1042aa2193d6f7311bc5aaf069f82413fdbb791b116be1e5b57b
SHA5127df6cc4bb466fc0e77268f0986bccb04a5118e54ca5c7ccba4fe19dd42fb71c44d4d244b5fc64af653d2b99a677b0616824d5da3177bef92d95c775095015275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251a576872f361e7a2dd8c196bfeb48b
SHA14c63adc03ac2fc26a1a9ce65d6af3462bc0cc4f6
SHA256dfec2b5e2a39a39c78def716c7a709cd246b88b9311bce8e7223f6f1c0015240
SHA5128b411647815d8d37ac1e036bde88480aab8678732a1b18531e77aaa945c394468dbf1fde11e19e666b5afe6def25cc3764dfc08fbe9f6fa098b9bda54eed8071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b7889599f0855293b40a61690d89ea
SHA1a5e1a84a418eeee5e7565e5f9fe8c5d15472e45f
SHA256c019f01f1efeb82c4291fc55ea65b16013901836cf500986c438b0d2f8cce321
SHA51285e051aea8168725444e3ad600369c52657adbd63a797be287102c450aa26e5ef9b2114cc2777b181b508b9a1a0399e54a021fe26cd8df8fe683a40e01ac2557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389a39c0d30ff50b7238feb816f94a4b
SHA18cad19f09a954e3ca24bd6311295b6202aebda98
SHA2563eb16a43f02b3f549b2f39381e48b1cf55d1fdf74cdeeb4e28f32c2fc1c52d78
SHA5128d8ddc5321432460cd3e3144cbcdce4ac88c7e11f76d14e8276e764799b867ab82153c59c071034d089770fb23562e72a6face9815560fc20d09cb9a7345d198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b793d1eadc975b2e204e7d06c89ca787
SHA1d40db3f962aaf8f94eaac6952e0fafa7403b1733
SHA2567e0e5524bd2c7fc86a0589e63cc7c05d75a9667096b12af1de0bf0c36bd8648a
SHA5120cee91467d5408d033effff878e2942329703260e8e6d61652a1eeb2a7d255f06fbc5ba7a96921a95a2e892450118dac8bd7dfb18920c3e061202e332ae8d7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4152a90cc476149a974b9303adafc0
SHA1875da0e4f280120b8559d938a7a696513b605bca
SHA25666bb07f5266ea02aa16ab874b0833be3c13d849eafee92e5170d7cf025122422
SHA51277443364542082b0cfbb3270cc2c2da13e1c9db8fbdb22b53b6530abae569c3c329af9fac8b3c1fc5e42aaca7cd07319f1a6aba124f22ab79559ce8cdf4f2328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573216d5ec58b88f6602a068339cc0704
SHA1c3b6c07fa38ba243abfee635cb5c3a3f82b0c8d5
SHA2563f90de889df67cee76f9093de4c457109cd4b08ab90159e02ff21f4ec2c2ae09
SHA51204d187a1db0686b7565fb14e17ff60b65514533d78cd400e9b25fd0bdca8fa01de3d88c490eaa5371984a6dc4dc5704798a247ce94eb87438e41c1761edbacf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9e5658aa45b1313cc69313b6de5e1f
SHA1d95416033839f0960b86d4721b7027309da774ff
SHA2566ad2259e1d102eb1c5b8e2102585831ae7dc42d6e9f773fef2b58eedfa876088
SHA51284fda76c5071fab40efbcb690b4eb7e87f46d146942f0bcac849ef62af666ed2fbb8b18d96305678e41570ea273de0df2e4080c1068578e499a222e0836ae0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56798de080153c0e962d5beeea32b6df4
SHA125978edb3a5d0bc8d6481c96a7c96b7281fac1df
SHA25643c489ac3bc0ea05f658c1fe7a5fc42314b9b1f0c29b2e20c917187fa617af5f
SHA5127609d5164b90dee577b5138b8fc05816ab15b9f7673fa760a33ef60795d36b466a20aef912f7b6540f560eeffc6ed56f2ac7b7184344a3d027909e04d72abe03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334c3e587a649ef6e0e8b3daddea41dd
SHA1fc3df1543b0478de70a8c32af76a9a4ad7e293a7
SHA25641d78354da7376a13a62143330d8d2b744d4d3a50b452f3114391e1bcf545b98
SHA5125d8f71a19d771e3ed90551e4a37e0a9488048269f9987e1013d1281db047c6160980b0313f5a7b9f3c04ba9644083f294cc5e096a8ee87dad5452df469bda0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa29a5a95763b1efc4a4ee20c388ad8b
SHA1a603e956dc6a35f93ab32227ca72d07b2d61f03c
SHA256af8fa1e668e58402452d3b4baeacc552734b05747648a7d32922a06849d1563c
SHA512dac3c8053c2b2c98fab7bedb013cffc0be6559b292c58689434bea1175c191e57ac99fd0aae5c902f11c107b24cfd0537fd59af78794a6e0942aff3adfe036f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5e23a259dac218cd2a59618de3ff85
SHA13afb388a843970b7a6fac5c5dfe49e79c7de01ed
SHA256d695ef3358118c102127bb08f2e8668d511c5202b46e284b438f075f49e1dc26
SHA5121e54ebe8cfea097ef898b9dfbc926ef690b997d71cf9308e31f19cbcedd709e6be7f2588c9f301128459a662caa4f92f04481e2480fce2817531a49f365626c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0574e1d3bfa938874364589eb4de35a
SHA1b776c3eac5758751dc28f609961f2b4947090eb4
SHA256c967b57bcd1572be5ce6d9a09e08fc12abaccb249e0f0d58684aaec6b9cb2054
SHA5121aeae3154ea41227b737a31e316157b5011830603a078de5a7f7afa559a434ebf72d76b0390ba5a397c1da56c8a05526f43be2fb6fc83cc554e29ad99b4497eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb0117c5264051d50171c14abe1572e
SHA199ce01b24ea422049affec7be0a300b4894be882
SHA25648353ed0037fc28dea4cfde96e4b5ed757d9526c32c48f00b1fc27d1a1181aab
SHA512ed419edc8cecf5fcfa82b8602ea35de61e1c4c4dbc95b28ce52fe779b2ef38dabdc32b23aa93f3bcbdcbdd79e6d78a76858e49602ed5b4fd46fa40fa271ad20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c64f5f45e299c4c6e5fd12d8b9ebd7d
SHA1fda0f4aedaf88ddce1cbc954ebc87358024378a0
SHA256885f244950cf5088d91be98d6577533c86765cf808d5dbda5412923e0b682e38
SHA512560a369414259211a8651de36798a3a59911d29cc8c16d2a5b92c25ae0a7833bfec51d0ae538307360c64d12c63850ec8e2a466951254b73c367a4cf65689652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c40a248f3c9cb9db47fe3a01a796f6e
SHA10fa2ad4077c2966de8ce0c1855db5a3fc34081be
SHA256fdb38177427af428fe37b0597d382c3d3dbd96aeb05ff0d06adb8c608953e2f6
SHA512d3b8f47f2668866014008969fdc6f374b8ccdbe66c46d623e95915a682c4f732e0d21915e77f7600cab5264c7c9c81f9d86d3015c057932a974452fb06e4b165
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539107041fd71414b038e91355a0720a8
SHA114a5ff8841e396348ac426bd64af4ebdca3f4848
SHA256e95ab2741a4f6281ed9cd498f5e604f940a3995a7d47c17c0a641fbc79aeec8a
SHA51200b2a1b1c5292fdaf93622db7d358fd7648b68623b0f6e16e8ca9f29689dbe111606b73d8ef2572599477dc510a81f4ef8ec8b3dec1815888f1eb3de517f6a5c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b