Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
ea8fda064dc776175676903984a1b9a3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8fda064dc776175676903984a1b9a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8fda064dc776175676903984a1b9a3_JaffaCakes118.html
-
Size
11KB
-
MD5
ea8fda064dc776175676903984a1b9a3
-
SHA1
855b2e697fa480e9a036417c6d7716f482f4c90a
-
SHA256
423fd34a673611656dd955e57cde2425f49648d747837484345a2e3e3b2fdcb0
-
SHA512
547bd4de58f61276ed747b1ef1ea7e714583c38d34a0067999a87b31caa0cac6edd79c099d7a655aeb481f37000c16747aaade5367d22842cbeb08f9faea2274
-
SSDEEP
192:2ValIsr0r57M4HxaOT8IR/w1wvqLkt1z6uBuLbdU8d:salIcIQ4HxagR/gqz6guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880968" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000497aa1b42d08543d5b845d74e225c04ff3f8370bcd50e7bf49132df1852ad9b7000000000e8000000002000020000000ff3692a2c9e158dee3b1cefb8cdd09b43a7e7ea8e5068dea1f1c7b55c0ec8f6f200000006745c590ad5c943711619bfb15f06f268280f06090a494dffc26b632f905a52a400000003ab25466b2b81f9bb90d810bfab4b3d1492a262c2b87cd993338e0a8240a2b8957355de9aab9030dc2de4cffbd298b3231e585431e588a52473da58d54cf576c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43BAC921-763D-11EF-9E99-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c032944c4a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 904 iexplore.exe 904 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 2764 904 iexplore.exe 29 PID 904 wrote to memory of 2764 904 iexplore.exe 29 PID 904 wrote to memory of 2764 904 iexplore.exe 29 PID 904 wrote to memory of 2764 904 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8fda064dc776175676903984a1b9a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b82a64f06348936546124ea332d0af37
SHA19bdc28ba8672eca136c33670e005add77d0517e4
SHA256cfe2be9045f0821fe515f601e589d144c299084b6331c9a9527ecf61fb2e4726
SHA5120e3bb5b51f3d35d15f1836809170e947d6ef919b1c397b0b8ecebcf56773414cd2d4f3d0aa174c1b50d02a938aea83f469f390bbea8692b16e5acf71ca33bd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db63d36e4f38a1d00a4aa58545c77b14
SHA1edbbb38d3ac0a8faef81988be873c58aae2ecb87
SHA256a0c7a380e31a8b1548f7d17f8437e24b94eed5e48ed184cdb7ef8b4a272e104b
SHA51286d66942e1db223aa93ae79295adaa5326422d84975487512e7126f405c60736d49c8297f48921f1641f40bbbb0dbdaa8129f75d7212c95247c45a455c17b242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f9919ba188524565280e9324b67379
SHA16524b55168e6e09a42b8a5de279d1029e34c50d7
SHA2567925e4d3cbbf041c9584d03826272e85ef768b1129cec845140f2280a1394c71
SHA512d53b32ad674160eda1c65a33150accb24f2905d03093eef14e32336a3eb652018d665c29eb19322dcf60abe91e1e257d82e6addb716250944efc403d02c68f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2c2ba950921956fd1b1150201de052
SHA1648c86a69752d2efc67658c41549005333fa4bda
SHA256f9448106151d099f1ccfa38e4a59fd45b03ff8c32c32bed835e6b7eb3d777ffd
SHA51231c9e47b5b9f2c7469994f2bc274e3e22f0bf3fb8cacf02a4c1979d9a3714769c25bf1947ef593755b4af7d0fa118d80f63599b4679b149497be4b4d87296eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a12a8f09790a1410564204efc02923b
SHA1f433379d9319261061ee832eb52c0e3e138f8a79
SHA2560c57dd4ca1510544bb1db319e4c9a0b6b4d95c190f8a494218d5cf22dd2d40e3
SHA5124a9511a99e906a7b79bb796f24ffef44c394c5d7c817e037efaaa75ad67428da51659961de762241f02b6f2157703db4b171ef492384ecccd56ccf6baeb26ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d6250b45a6542bb50e72f02971ba2e
SHA1e3a75f3d355cf5d1d31069a3d947a8648a4c31b2
SHA25611cfe61ba1471f4aa999e6acfe5be50238fcc63718f5b33b62d9ea21b22b0541
SHA5128fb22ad634f0b1a61e8ee5445bdbe339760dcc06d9cc8af32d3b443d358345d26733e6eed2cdf190cb769c513756a3c64ba3239b6475e169e17d3739e5171a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f948d0aad4937d7ab8e19d88bcb63f33
SHA1d41b62613499a4fc11ff557d57daf0deec9f9396
SHA256e2b2b5f544d09c9c1d1296935f87bc652d7ea5e441bd1b5a507c5b4c2adaa7f2
SHA51214baaeba6d329f0c6ac563a76cd7467d996be72a2dd600a2c2e700eb4eb76664e5bee60ce5cd0656d713313b0fc421426d85b66de999ec015ff3ebcc0167edf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59418bdd021c41ac186ea16415b8786b9
SHA145d965d507eca0eb06b0fcb1a468225b0a234d65
SHA2568ce431b727835a26fe61a9dbfc715a777738a9cec20961a8a1ec884a164b8d76
SHA512cdac98b863dbe0968b02ca83e13c624462d0b6f93d4ba19f10092a94bd3a6ccddf4bdaec0b493da436e6b9189a91faf4d9640bd698d82137fd898aecd3621a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9b566d9d4465c08defaa579db0235d
SHA13b080cfed6837b78412c40581e2831483ea418f2
SHA2562ae3228690e3dfa362e9d6e575ca98bb20db2cf916f6f73e29131b10c67782d0
SHA512b394c2222da307ffe4e545cd674e218590c6a6cf059f3691b37a6b864dd4d4f3e87d40e79e5496240709567ce155dbd2a6b8cd5d18264ae36b3ccea88ba73cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ca2717559c9c55faf123d1d77d605b
SHA107d6932e464c4cc36c2529b3034a6157779b4f0a
SHA256aac3e773ac102f4e6c9d7191b14668cd972a78b2b0a8171f013ad4b76487786a
SHA512bd7c2584997275da8f2a808c6a63b72d69a57a09dec3eaa126afe8c5ac5364d1e30e2db0d51121d776731de9a92a146017b3b263cd8c95ef4f2b1f8b6f369f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d2339760049a216f13cb59645cf48ce
SHA100f23b9f397d823d617ead690f18e6abbebb2afd
SHA25685c4d31a94024b47024fe010265604bb225001eb64ff6267341d4f55b3bc925e
SHA512aed3dbd40d93d506191518524a9d7cd1303a589ebcf527f81f6a7342dbadc19a46db24e6961ec29413d8e135342cb7f4ae1f5c0cadd768b313499861575c2b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59069278319be3c42ec3f70db13cddd2a
SHA1f059e86446ad5f8e5d9e4d231064d670c1aea60f
SHA2565043ed5da170e50ef5897449f53bb7633635365a3d70b9afe0f09cefbec189aa
SHA512c6859a21e128c62b7c8aebc526c24c3d5c6f11a62d74452c7b402dca1445dfb791c321d31ba93b30f760930bb3ee1962dabbc2f78c67f1e1c2fcf8cab38b44df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5192cd6c2195cea48cf96efe833ff69fc
SHA1645c1155c7fc50686e0fc659c1a5dab9ef483d28
SHA2565ae237be7c0a5b649b259b949e4114aa1f91d6728512922577865edcb095194a
SHA5124ecbfb18547072d17a441e138349c760ef44b6588361c958923fa48a95cc1cbc40d1dad383e796e8c494c05e3ae7ac32cdcfba5f58fee4e4e2b8aa7a89e25221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57efcecc4a4f62fc6f1f5bf09af21018d
SHA15641b97db13632e5e23914170e14ff1d9d2a544a
SHA256d972f20821085f6d21221e4347c14542df1dc804d7413779903577d186fe1439
SHA512f033e3e534a678b21454ee84a5e84534c108e036cce6f11a60ecb9afd3486d2e06068618bf131ed447fc0885c97a7c4b95aadd25d2449b8671666e8927167e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7070bd0d1246c2dd762fcfacd43da4d
SHA13b0ffc649f323bbc8120ba4cff843f8abc765df8
SHA256a4b549eed23a46e2b6b9010b7fb149cabba0009b073a446d2a2db530b47b40e5
SHA5122c5f591d2bcd6ae7127b4ba99a25cea02feb892141fd3e203e7a4fe68633db407bccb8f899a0cbdbe4c60cf4af6a20547b1fa1e398202bec1a65325fef5c211c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4421c75e039193d0aee57c2ac8fde55
SHA1934948f71e2d228b35e655d54dcbc9ab6ecf2b6e
SHA2569bb4cf978a8f771fc61d2ce0498c8784eb151dfa665fe6cd273ef2026040bd46
SHA51253d0808010393d1db2b24e463f6caa0a921c4c2bef627fd9987dde1c3b4298228d1b116c56c1443d3851448fbe1f23661ccf799de2760e4825c106c89964f620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5081001c7132f314d42e0d40fd88b7a46
SHA1df03aa42444c7d3a17cec6866b851525e2df71a4
SHA256f9d4b60ce9ed94a440ecba48a28bfe2bc1cf53c57d0c09159a1c5f8d09bdbd33
SHA5121f56dd44191b1519918feeddbbe14ac5362904e2f12daf0bd135f41d3e44f296258a0bf24de533347ba5cc80c1004e51096fe7945ea077c202c329617a14d87f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1d3f84c2531c84140d3fa4385caed1
SHA15cf0ae2f11d2294c115f1448c09badc25b0070ec
SHA256ce743e37450544df939f807f72dd512365130a2702dc0a9bdd6ecdcb11357656
SHA512024c5f336f586adb8654bcaca94f647b589d1b08ee44d86b5950922f11d83b37573202712056c6d5ff197c701cfefba0005291813ef8411145b3a9afe0ff2b8f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b