Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
ea8ecb445ea70f5bc510206ec2d9b867_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea8ecb445ea70f5bc510206ec2d9b867_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8ecb445ea70f5bc510206ec2d9b867_JaffaCakes118.html
-
Size
27KB
-
MD5
ea8ecb445ea70f5bc510206ec2d9b867
-
SHA1
44257bc663a68d9307d6256b0dc5630b00f62e76
-
SHA256
4dbf4b5ea5c57faa5778b2429eb951462a8c9f5955550ee6c7b5c8cad3d29524
-
SHA512
88908121c2f8f4796a0bcdb2b087bd164b258d953aee359a3de0f64c48d53bbb1c8bf95de322d25490b669b3c5cef37d2bfca8fb082a9a1ef55997f59b0da7cf
-
SSDEEP
192:uwv4b5n+mnQjxn5Q/NnQiewNn9unQOkEntr7nQTbnRnQ9eKom605g2Ql7MBQqnYb:XQ/gLQ2gBSalf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000481eff11ecf5df81001f21b714b52c2b00f488555d6a75a6e08c29cce0fb230e000000000e80000000020000200000009a1cb2147e706ad13796b167495494a0b51761d3c25ef2e7e9dcbf937111300b200000000817614e8c98ad980319e0a3d87d26f4a5779c1531cfbffe4466c479cec0da9340000000ab12aa73da4b70273ed5d8b250d74709be861bb29a732de9c9eda4734b65a930861717831b400c17b3d83c2871b00f22b34e06a1e8c1532bd29b921cc91e2161 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4BB8651-763C-11EF-8BEB-4E219E925542} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a6f19a490adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880751" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2404 2232 iexplore.exe 30 PID 2232 wrote to memory of 2404 2232 iexplore.exe 30 PID 2232 wrote to memory of 2404 2232 iexplore.exe 30 PID 2232 wrote to memory of 2404 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8ecb445ea70f5bc510206ec2d9b867_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a457d799d7a7e57aefb66131048e476
SHA11a0f150f57ff7f8fe3464fe456a6b99a07c0467a
SHA256337ad12fee27718f2d89d5ab9ba32f13deb87029dfb3536c5ccf01733e190360
SHA512bfce58f5864a913e3eb15ad32e9bc9a90fd467770446de13e43ee618fa0453dc275e485e2ff724e5405a3af60eed91130095c86843bdc5e86d9cd5099ad29dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58926fd636de44ca3d3935269d6ec7cc9
SHA188ab975d09b05d77f9e78364d6a51ecc3fc44685
SHA256b46ac7bc03de0d17e5a9dec741ff647e031bd9ac46ab331d62c72f3dfefe6299
SHA5128587bac7aab68c3eb7c8d50123c0479864d96824c47d1851eb1ae9b9b09e9bb8b5d1003d4badcae85200c6eb5fa61445e820f652bc92bb5fd766a1aef9217fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532da6bb8701b4634cb53dfe414c8914f
SHA1462cdf1e1feaeeedaaa888e17fc85a49b5baf04c
SHA2564ee3c798240e5c390ed807e11be399d7639115e8079cd8fcee4058fb59cb3054
SHA512e8f962a8737ffe1540122201d0c77918b7e18e1af57af8ab009673d56551d4b851cc4e64e8d05547f5f313859a38a73cc7a35eed29ddc4af6faa5bdeaa92b957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9abe78e611ee79c815410aaaaf0388b
SHA10215c1ed5ae5d7ea8d4bccb2c37e787b4da473c3
SHA2569dc0ce0f62d6b36567cbe1c55c4a42484311e83ed98a6d0802f93e7536c10132
SHA5125e733ed05cb147712561a0653bc45f540d354d8d1a7dbdef26cb3b4d2ed8a92f61b1d7ff232a7ea641c27c75461509d3c84f6c43dce966f76861425c61d7f659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603c1ce4cabd8255f258546d3f57b955
SHA1a978700c5aed746d4f1c3e1ffe5329df1d71dc5f
SHA2562083a489aa6caf34f298db4e691d0e3c5cc421967f4083b6c73c4fb336e1ab11
SHA512d9c72c1e6eff94a4116a19e7ffc5971afac45ad661f71026fa2c9b0354ab7c27c4389ca2f441dde500c67f169ab51ab4043198d4affd1e2020d74e935a3360c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532793bd7437169f206252b07ebf3014a
SHA1dabb7b75456639fde25b9602a10255e2b3245937
SHA256c75e2fdf84555f6c79d9078c9022679808d79c0e384fb761da74dc9f2dc85961
SHA512d282a74c4dd30edfc3dee3492128c1807d97317e66e48a299f1180ff67e017727d363b31b6576e6d344fd889593a5c95933af0b5b44033c0c480d52a6dbfcb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592dc999703f8d435bcde4ea950cf6dcc
SHA1611cd3cc1fd7babc25306844730e2e826435efd4
SHA256b6ca4430fe4f922b5ff4f9559c71f3623b74245be2b14e43ad0cfd47d277d2b1
SHA5120d6333450d89c173adced070cb61d44a6eafa8bcf8b26c31342100007a736751ca078109a91938b535328ea1514e4919983399f48602053b168541a0becb2406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4385108f4a6a944b4b0d7aa475149c
SHA13aef7a10a5ea642791b5107b7c2273a7852223ff
SHA2564e3cff03462ea24521c93ecb5e3f9320cd591b806ca57def83d0372644835766
SHA512333559167b460651c3ec553ff7d3689dfd822b4307b829cae94be8a31edb38ffdaee8d55825fc4f69085a80f2b7d18c747f092b575f23549da32521d3a1ee4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584586e2c4c83d9b5c67d3798d8adcf76
SHA1c7b11462fa9c445de3b42bf8c52e710b16ae268b
SHA2560dba90b4ac314a716bad2306dac3e9b9c3384374da125a562ed048fc812f6d9a
SHA512ee64c6b65ee166c15dfb85853aeae26b3db24b8946f6f77196409e4471af353756958ece112de85361d5dfc8df04e65df749ebbe2cb2c2175020f20a468decea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85268677189ec714365d69b28eca168
SHA1fcd827e347a626e435de0ff789404db8c03f9bdb
SHA256f6aaca4a7c95b9911e3430ad3f24347dc5cd3563f958c396d0e498a6dc67a6f5
SHA5123066034140ee1754b2ee21eec06e77e46ef828ddb63a9b57bb2041ba97251fa206442231231210cbee353b04490948ca5a9c7b9edea1a15e5c051c337ce529cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b719b904276c5918aed85a84dcf572e
SHA14040b80e00cee203b24a5b81c619d7c9aa5acc83
SHA2562e1c7641ddbeb27b699018061bd6b0518cda8a08be34737956f5ab20764c3be6
SHA5125c8c1cefa118943d4f2fcc4678354644a18ee6317a128676290a1903b4bc2303feaa7685d09746715e1e3c89bb4b9e701f73858bb8bdc2cf7636986516d49413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab869d60b05ff77bc54e8338e7a2af0
SHA133b3ac373793292d54bfbf02b1290e4b32131ecc
SHA256a59abc8f33a1e63c0748a67c687751acaf1fcee7114fbe2a817645210cd7dec1
SHA512381248d0ae2344f3b264dce262860918bab8f8e17baa24d58ede71e5007aed0b210d4edb81c3d16b7b88e4ebbae85c12b4fa239c27e1bac975c549c867fee455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5bb941c4e581c25f786491cfe0d58a7
SHA10459bdfb0ad9f887cb17b58bba1cbf031574a9dd
SHA256e21bb302916d9ca2b89417d1313b82a52014853517f1f3532fb4390daaa16abd
SHA5126a5f841b87dcfc2828283e96853933cea2c3450f99ee7f47fcab68fbb9fe18959c6a3d9c81420ebc80d6ab0b562bd9366c3a0c3099ee2e1e28c15ff8cb3a34ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f81331f642fb649793fd1f76a8411b
SHA1db56c194836268b7864d43eda18ff8ec6280eb16
SHA256c40b9deacf5f14be6d5d8bdcec26e1b7a878e7cf6e8f02962ec5aebad9b007a6
SHA512e66dbe380bf47c12b5a54f52c0da774a044c53d2b097ed1bf3e8e721d28bb58d35e0a08c504b0300a6cb9eabfed76023a3f6993c4bebe524d9138805b0312a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3ad5172bf71635736ed8af0143cf24
SHA1dd23ae2c3b06d775e852224071b48544131749f1
SHA2562cf19cc627fb2e06c91dc7d4ff8642c3ac1dfad31c3b0b4cfa7383274325fa5d
SHA51280a9afc21a5aa5f6df057837af89faae30e9b1ed03f45d32d94ae8b8804a7057d5817d2c3aabcef06da2758089819abf18dbe3e5aada3dfaafd0eaa98fd723d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5b2c25b0adde22a6da055e47fa6019
SHA12ea0ddefd72ebb9625510c1c2e8ce9af40cdd7b8
SHA2561b36e1d3ede2cae09845ac8ac8e49706842a5fffd06fcdb0f2a2201575698224
SHA512fa94d24e9162df8e136a57de49600415c689fd6ac48f6ba3171abc9829f85253fe7f5fd97574582ae50c369fd5d343e21dcaaa0deaa8195029427f50793807f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2531049369e6e06a4c3465f4e4eea3
SHA19c40e65dfc792dcd1f51a33e3aa933ade7a783b7
SHA2568b6d196e0df381f6b49042fff46b05a0195c0fa2bd70c3c612bb916ab6edcefd
SHA512752ab86043012a15e1255452a60359a3a7ce56882c1bc27237881e624a133b62744a39f881dc32b9ec1375e6bbd1b36adc6cdc49c8b56d662702dbaddfab338d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b