Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
ea8e37656c214943c19204f04893924b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8e37656c214943c19204f04893924b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8e37656c214943c19204f04893924b_JaffaCakes118.html
-
Size
27KB
-
MD5
ea8e37656c214943c19204f04893924b
-
SHA1
3a5c0172b28422bac923414798e51472a218ac9c
-
SHA256
a12ff960d8b49a8a2920ec0dc423e4e051504be8445ba528824d827a31ff20df
-
SHA512
254bbef7ecbc373564d7f13e67c63820ac4a7622abc3b43ae027c06b3d8d7b942e70930728fd894321c299b9ae1e2cf54a3b08a3b9d054fcc0ea99307f8b74df
-
SSDEEP
768:fIRIOITIwIgIpKZgNDfIwIGI5I1J7SrIRIOITIwIgIfKZgNDfIwIGI5IDJ7Sn9aD:fIRIOITIwIgIpKZgNDfIwIGI5I1J7SrU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000901fb4d7391f4d6481d73581e0a477d761b48024f1c28227496b3872291f0f2b000000000e8000000002000020000000fc18581db7d96ce53b5f7a0298b37b2100d38dd195e5fbfec12abac6886afdcb20000000857fa57ef10c2f4868f0acb2797b0e50433215a95e1d61567c6783532ef1faeb4000000061cc6c019efd10202c00b9aaae79c9b346e4e9898eb406118674a143fe7196cb2ac591185108ebfbf7c8d4572b45df62b93e8b66dab9015096da3288e4101ef9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880626" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309a6950490adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79AF2EF1-763C-11EF-BA28-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2320 1984 iexplore.exe 30 PID 1984 wrote to memory of 2320 1984 iexplore.exe 30 PID 1984 wrote to memory of 2320 1984 iexplore.exe 30 PID 1984 wrote to memory of 2320 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8e37656c214943c19204f04893924b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f544b4022dfcfa9f09c7aed697d88b1
SHA1c73f391ca09e325a86554e74111c8d43d2780cc4
SHA256ad8a2fc0d1eb349c87a1892cf0d57ee7581780351553c3a76dddec225fa94fcf
SHA5120a5c7b05201233effbd05aa108be41883bb6f6b0192f5706ff041a75ed5289d0649ac35cb804eca484fda5b961a7d0aaab1f3154ac7f91471eb9a814861d287e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda4bd1d5c02a5826e8ee4de01469642
SHA15268a8846f4f0cda7860de8678da9d4b730d6518
SHA256d70c35dd69b31842b60274143bc68b9febdfc9c5ac5047191b652c7ab966f4f4
SHA5127c0cb7e2e5394956c31844bc19eff5900c89cc02ba34d04939f36aff2fa682958ee6b0ad0aa185654e1643c4990f88a52b0c00fa21b77363dfbdff07fb027ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b0c10494c7827f3e724200192ff790
SHA1a50d4ff5074faa909895a0b6bf2d003118165ca9
SHA25631bf1bc7f8f491ebc9fed9727eadc35c814dfeb09fa5cbbf630abe6e284fd377
SHA512c98f0f3fe13260da79947869d2abfa478ed570b73dd1536283b7d2e58b6e7b67dfef01fba0b4222f0f9d093ac4959b846a4aae3c5920d32fcd0b85092c0521cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57357a72586da75f8aa7baf31ceb64c78
SHA1ec3f6affb697ef8a73e4e098b1615342c58c24c8
SHA2569f7d138af134b4ca2359080086e440013f458fad3e88533e415582d2117e990d
SHA5126214694cc81d2ccdc1e96d3ee2653ac527fb68119bca88192cbad9365c6b009874bdfa136d6e4aa4abc7050b2bf9bf180b07c42a28e206fe94b6af48f493fdd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd3eec75c1ef37217456ee0eb76a5b8f
SHA1dcb21dd6ca7dc61c5d5549a6165794eb972b6fa6
SHA2569512ca1bb26cab7ce3ddd33722c5ade8520cd98f1a3872a39bd6b73d77b51d5d
SHA512fdb5321566a097654c19a058dc23d7c0109d7817e39457da27bcfbc446eb6b04e06368ec6a0012eed733a33bd2b93df77fe83be6b9b9b27c8f03662a6d2a1fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab911755e61cad8d3f2ae208f304015
SHA1fd79fa24df5137a061860abd59e71283b350014e
SHA256df7b152c421ac94b5c889aae0a4de99542a0138f4d2f13d25d5b91b4f2f7fdb4
SHA51202b4e68b77e0858a834cea54ce0b446aa4d3d4c2b9050b0f4b3cbbb02956a65ff02492b7493c741d81c55b9c03432e7d93e67beea0237acf637c01c593e4d1e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e16af2735fde35baa6046e89a83cca4e
SHA13c2bf1221a9198a1fc8142aefeedbc0bee204d32
SHA25696a511618ee29606ee237b86daafcfd9decb0b2154cbf8bff4610f6d727e204b
SHA5121e14400fdad91d6f47842c8337a01ae43c7f77533f0c8a425ad252358cda0004388cc92791029e19c5534d85a949279c83cc41d455612ba016b18767c2f607fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df590e2be993706f0c386036d1e0066d
SHA1e99c8b57048316c9c416ce23ef2551ef91a4b89f
SHA256c28c75843e2c8eae81b4e5901e172982740ee0e88558f6e25b6211dc5fa7c774
SHA5122c6045bcbc7c5050ee9f02032c9fa28b90045d5957f7ad7cfa9cca23ee9fc62f72626804b434ac63c1b1f986ccfcc35748e979ef29b6c8cfd2ae3452f89d82cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5890c5007bbf000e1fa35a64047b80685
SHA1d7835a94a11dcf57b9c4596877c9b25e903561de
SHA256bb297e571fe113eb731c8951c1f51f6df3efb31228f68709fafaa87fb2ef7032
SHA5129ee964c96aa47b32b8b7a62fffd0d394fe2cd375cf39ee214595a91bb3817b8721534adfe9a4e161aaef465b107fed9e2f7e6d3a33a5151d1bfd01894c97aca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d208ea2dd7a1be6623cf19263e553956
SHA1034a89b8b2444d1cc749fe297dd103e360e6e473
SHA256489c2398d4d52e947d6dd767ba06a7cf488b01d96e4890f807ff220b3e0a8870
SHA5128cc7367da1091347bdcd2135d2fb8b222837ec311ea0e7efe2b3fab033d5b169d480bd07de6655db0832e8bdf04051072ebf27ca97818478e1f459ca7ed729c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a000809fd7db4761c3665c67877741af
SHA1c2bffc8c1e1815ad8e1464397607f8fdc20f6af3
SHA256acb84d0ac066d3537597220ae67a037d9c53b1fd7c03d1cc1a1f430e47bcb5c1
SHA51220263ee027108ea3c71e290d35978f3b41c2bd7656d011db4f6b4acbf23f4b0406e37f233f90d0e47c5a82f5b3d38a658d43d3bb0f752b11eeccae62520511b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed211b3af16fe340c92a09e25693cd7a
SHA13edba174b037a51c78c5ec9db99b2a1471d5f812
SHA256d58c1b8f590d7d1f41b22d77629eaa1dfefe1cd5456536744898e89a30bdb6c7
SHA512b494d0c008d36cc0414af7f88809ae204e42219b6fda860575113fd8c483b09134a85b91d04d046bf256a373c29aaea13018cc874b308855223630bdc1084d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a2a31d3850933fca061dfe205a74b5
SHA10d3921e71cb18afe7b9d485262f2150b81c89833
SHA25699dfdcd991fa2f775caaf7d5f0ba7aa5dc671849a3ffded9b8929f3b26b120d2
SHA51242f4ee3059f16c75473f33e58e8d1779efd0033065235b9d0e0ef4bc7fe4f0ca8a4aa7d4e75d8cf618e49664ef61227ddf6598a2469f5f03389d2ffa23e91b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e80f3460d5ce4ada44e97d8fa2c9aa
SHA195375da73ccd90d9b6e9507a286e57437f8bb294
SHA256045b2bc26c9ddcf6a73e5e62a33fe0484937fa6abd3120f0e811b6394c5175d1
SHA5128ecff47b31e5ca7232514003dc43f013ec30a0667cbc2161a66ff44a04253c9cf94c4e85976477585a28f27cea74ee3da6b514168e6ca9d1fa4eb616a1a59677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c23dbc911970c8e473c5566df84d61ef
SHA1f977312862a7d33098ab1c7819044851d95c8e3f
SHA256fe8d65e23078321327dd494d25d45a63843b18f5b53e8b459552712772738ac6
SHA512fe6c3abaf2d0624d75342503238aef63c8c8b05ff80152a66a803f5829bd4233e243caadf8bc1bc0754273b613fa6f9856ae23cd2f21d8b420e2d46189cf1354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519145ce77415644b181a838ee0cea258
SHA1c0f58071bee8ebe76038e6944f1695324a7e1cf2
SHA256ef8b7cd4ae602be2dcd390e3cf617b9f6eccc2ace3f7a899e80873b162bec5e9
SHA5122ded97db97c2c3b4b8048cdf5005a31aff06c1fb3ac8320063cd8058aa7a61bef9b71960680d23362e80f3743d31b1f50bf2b373360e98e6c29bd03f7938845e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a9f3744df7b06f21c67d00f1f17880d
SHA1dde610fb9705e750d99c8cb573c5bbe06b6f2f6b
SHA256f06f2bedd84646d4639d1a7afbed3abfa7493608e555700b68880f56f0183156
SHA5128d15c7651f960837a800ebcc2f89fc1c71c40a55d529f107f656827ec08fc631b0b22fa132ba28b978b31bccd3b44b957dd0859ee386043d8eb607b2a7065c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b24c6f061479e9f0e9b538746dc179d6
SHA1b1d44aa45b48f12786bd5d831dbce6d5a9d6ad19
SHA25680cd019f4692714416791dfafac9f7723985f108528456130f979d074d5210e7
SHA5120965faca4261482a615ed3a50020c3350940aaf9ecdb7f26c91b95a1bd29ee95920af27f41934e237a67f84bdd4d1d8ea3b5fda482ea25d0a781fb1488d26994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc5eedce02b1480fc02790383466a8f
SHA169885c8a265282419a721a139d731fa236196d11
SHA256e82bb116c2f64a370d89d9c8f8bcbb937486ca559f3d4850fa1d9cc766a77dd8
SHA5125d8c9487391ef7c269e64b32efb62f0390f567c6acab857a2000cb9d7552485a75a4704a22bdd359ac8c9d4b8afd5281173291690e822be363bd143d69446fe1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b