Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
ea8e1bb84bfb75db51e518a8f33f5154_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8e1bb84bfb75db51e518a8f33f5154_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8e1bb84bfb75db51e518a8f33f5154_JaffaCakes118.html
-
Size
15KB
-
MD5
ea8e1bb84bfb75db51e518a8f33f5154
-
SHA1
9fae85ba9613b420bb9dc36be38249913a2ce5ed
-
SHA256
330a9ee8f053a54be02198c154ee989d4a5a6600e820c62fe955c726daa57313
-
SHA512
8e2d50917bc4f66e3d97df2ef7702d757ac55f7c6e2e2f40525932d52a8dc1bcf0b73405c093e999076400ecbbb5cdec1fb1deeaa4d285106e8b7aa0664bf614
-
SSDEEP
384:ln8uqnGDnW0q/TVSCSr5X9gmGIEgH/JRt9/h4AZLHJE1nTv8rFSmeWrsCuzdFdIn:ln8vGDn8Yp7bOZY1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04b4d47490adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000ea917578fa382defcf11488cea84d72ecb1c1d97185e10ce4aae7674e894ccf6000000000e8000000002000020000000f049396aa4b069e8c9b72e17685f720e32536d078c0b60e2b608c6babd42175e200000004a6ab035a09b0e041d939ec95c60f9dbc09cf3a70a00906156696f8afa76c4b1400000008fcc5fe344e7d3582a39ca09912f45762a0dc3b6c66f7e5b01f05e0552fe67c4e7bd30261e510e731500c9b267e3eb175534047d557822192c93adc742326c3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{701B10C1-763C-11EF-A97E-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880610" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2404 2536 iexplore.exe 30 PID 2536 wrote to memory of 2404 2536 iexplore.exe 30 PID 2536 wrote to memory of 2404 2536 iexplore.exe 30 PID 2536 wrote to memory of 2404 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8e1bb84bfb75db51e518a8f33f5154_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6398b7b63aa830a6aae2209c1574dfc
SHA11ef9a8517b33687af4d436b60f01de2ba9a45537
SHA256c2f6b97e576c808c67e298c00a013599c9c7ae269ddd5d35a4a646029fe6cac7
SHA51241655f692fe1cd109717288c2a0cd06b655498cfc6606d686da769752295d950e6d7d03a1f9cd34a3a9bce1a23ebff46f0f299f9136939af6514dd386165fbc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55102eeff1824f9b680b4bea98dbc149e
SHA12e18e0f2d60e104949762365530f0a9750776cd2
SHA256471fa0e72c6290afee651347cde8daf572f75d76c241d68eb9849a12689c2df4
SHA51285dc68ad89726bdbaeb2b30ab3e2ab24d0cbe6c0e204bcad997b356408c7b2f400d42a6eb35c775eb3441e047507b4dc50dc5d85ab77f324ac061bedaba6fcea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea5d457fcb35036d2fbf896e9772941
SHA1855ce2c5a0d34ea0b71f29ebc2ba0adc63571019
SHA2562bc1c5b74d1cd2c5b8c969852ba7a8e054854b9079b109dfce3b0730abc5586d
SHA5121bc7a621e2aabc7a9758bff8e7508aeb9bdb8dd426d5db6671e9e6caf88baf60eb8d4cf1333c94baf810c60a1abc0840c3de507be781c7c0820b6e2ddb2930e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53215c15bc5aa20b092829c9ded4704eb
SHA10d1ce5fe5cb9e22c16cf78f868740120a742e7a7
SHA2567d976bf036ce38cbdf326ab87530ea3a67583cfe56c13ae3fe03bac59acbabf6
SHA512ad47227eb427a77f86ade7ce3c9ee0ca606c0a8c71c3c3ccc042a98a9c60366dd765bc3d5bb5cb0f6952fbc63b2a9239f9b5a3d87b152587b5f3f88a6e334a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6a56a1f50d28e94a6d1b6b22308ab7a
SHA187d24e85abff35915bc88bc7a91430189462ad9f
SHA256a3bc6f6cd8d4cb010371503ec62133acfe7004653932926367c551a3d7edd9e0
SHA51240ec9695e8f0010f7cf295984191573921d5c14e548c52d28880d7a66d99dca67341dfd631b8eeb5a15291cd2a6b9bdbe35eeb019c521791eb14d0e9efabde74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae7d12d4f57fd6d7c2696e8975f6ad0
SHA100dc248adb7479805dfc3d3acb6a5630a45a7e4e
SHA25637096f372ae01aa0f0f896bc79674d02c5dfddcb66b7ae3290ed1f6451cc291c
SHA512bfe0bd1b1695864850c7abe33ba8862c707587c28a626855d30ea20c8993adae13d7fb69dc8ee777ff7035220fdf87ba96a5473ffce9a79bac214a47a5555c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8d4e3bac460736bea2a5c1fca13a90
SHA17a6ebc626750d046964035c41e5d75a6e6ee2946
SHA256d63c4378c99308893726553306e73376a0b385b96e663459220985d53a646e5b
SHA51270722d0a8a2ffd759b238c09937dfe6e77277347657aaeb4a1b3176fbd7dbca8ba965759895e923417f81c1cdfb448087c3d589544b4d586f67c9ffd9dd9a4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb0d86a54e62f82472066d0fce7752da
SHA123f3bc3ad0754fbcdac9a062e2ed139a9ee8798a
SHA2563dab8ea5d2651d14a638763760bd0b70e0adfb3a85b63eec51f56d249783507f
SHA5120eb88130f05e4281673ec67f3fd589190bf46652b5a289ff90081c82b5067fe645ff1b49071bd11d9bd4a93796afc32b0ed9a2631d1970978a58ccb6bf38da49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b2b9eef9416b39be84bb9d4444ca5fe
SHA1847935067d2bb96b5a63a211912aaa69e3459117
SHA256dc8481e7f49733a5bd7e5b0c93e4c872f736d54203d4ecbc1c35782bc849656e
SHA512e8159e876324a39f866a88f0ea84fe3c866fee753e35df617c608016c9ba0c7e472e894b24cc7cfb8a3c47cd342ea5b00fbc46cb614739cba3d997bf15940810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1ae86886b5dc070399b5acce6057cd
SHA16624a2412bc93ea9fb599a366a8a177e34460850
SHA256950e412d8885a9bc5616ecb6215d30b39dd9be5ed05854a05d3298a31c779dc5
SHA512c4df2e1e5b283503df568fbd2360598c7f530419d8b3c3b37eb7db3ee0b4f6a4356cbb610743db7bc5a302d5121758f1335d4d31f026182839ec60009efaec50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8441602f60dcbbc8ef0df01a31f3fdd
SHA10fb55b1e22f7416b65585aa7bfd37f910fd99dde
SHA25621b3f8a30c8f398b8754cb481dd9af2f827817a0ee8d08b535636b78abbd9695
SHA5128279f47c622f9205a5efa2ac041372e2c2a1c09b8ab9b2ca5990a285274718d1474cadec3c2f847065befc0b28c29b5ce92f127855d9c750f720a062195145bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a9418e7fc32b7d64cb7e55813f3d688
SHA13bb13522a788e8395347a6f7ec3a989e79c7bb46
SHA2562df81ce886051bdb75ed0fa7c754f9946b63fd6240a7b5dd39eeb8a8db1f2a2c
SHA51261f56de9b61bf5490c29eb614d9de8ef92f97b1f2ef9999d20e8258323bd19c982d6d408229cf9a62d066b4d879f0918f130558b6c8614803dedf4833833a36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58846279d82b3ba7c4499fe70a36c89f1
SHA19589a36c959696ac4066783012916c1f16487aae
SHA256f7dd376deee98977160bb4db8348818d34d0258b43d4e84d4868aa795ad11be3
SHA512fbd319f6061a3ea2927ae8f2493e61f3834a11316b9f0267fc6d9cdd06150bd9ceae430d90135e7441f7658b6c98d7b2bd2769eda4a1fab4c31b841c5a312d55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514edd81f7aee6a3be7d56e04ae444403
SHA15703fa876c2bb53cfb037c41512f31e8ac069776
SHA256663fdf712dba3539a7a6435567247490655ecfa97471e604a1b3d8ae0cc17844
SHA5124b5085a98e0e4f14397d36c9aabed2afed94da74c8a8bdfebed3a7a3f766f0cd869242a70ad1b597874ec77cdf345ea2f84f2a6865534858c275eed5cb0952e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efb79a6844a0a99edfb49a183d1d0aa7
SHA1a0ba9c7f37d7340c7e5769ba1782e44521ed456f
SHA256cf099b5f33cea2d2311a529a40c979df41a1d09dd5eb0f2c926b1675add9a531
SHA5127c797f0bbc667952ad41614a53cf468bce8a2d73fbde09ee4965cec5654ea3c5e0ef60310444956bf5215323769c5f8749a2681ea01c13c6382be786be7b5d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e20ce7dd855885080272513f74d7d10
SHA1e09b36a92c7c1eb3befa7e91b4a1d3c9c33843c8
SHA256fce66a69b165fdbeb9385910bb5958ba6f8c9dec7ecd1e74c76edf83c1bb2955
SHA51216f28ca45d5a92c42c5dcf6799d0d28b29bd8e540b882c9f3a9a627d9a4b1be385649692dc05703aaf3baad3cbc71edb275862fd0139936ba827c770333cc286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dcad8822d4db028ac25e5296f3e9876
SHA1de83c275b5732319b660ddce9cb9c06c7e667eb5
SHA25699e0504d0a30f44be1723a5812b8ed8771b57861529ac53cd77714c2f9542c88
SHA512e1f9e042b36794a18be5ad4069887ef1a2a611839a379847e66708b327787ff13b949b4f3949ed54da17cee8a4f547a8fc667e7e33c894bb30070be7a25d691c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d012c2b9994ff5f698c7ab108d6cb538
SHA1537cbd20755af0bbb45f0818d63394abc5ea6434
SHA256e10abde9245eb5770054d9264f26b0e6f52df4f9fca71eba0b0dc6532b06dfe8
SHA51215f23adc37279cf53203dfa03e3f5d9cd5545db4ef138600b42b53fa3e97550f875d35be49a42d26dd950e0fbbe6dd3bcadca492db770f000dd7fe4297dfd47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50448e3b8623f42a6dd254381169f0ecf
SHA15367fe03d93c7aabf88470fc00d3a189dfed84d8
SHA256f3f8eb30725df6fe1f356c12c011f24c33a9e141296de4fe8f5a2948af408fce
SHA512f761cebc66012c632f1d11b24b2787c029c5bfe9d10689350a1f04cf837198dbca31d92c9f1431f2cdc935fe9943223260bd88541db3b7b49270a8abc83e940c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b