Analysis
-
max time kernel
138s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
ea8f90c9702e3499791f98c468de58e2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8f90c9702e3499791f98c468de58e2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8f90c9702e3499791f98c468de58e2_JaffaCakes118.html
-
Size
194KB
-
MD5
ea8f90c9702e3499791f98c468de58e2
-
SHA1
dd320bcb1a6d33e4f8e575d72fa18522ad9aa7af
-
SHA256
df28944a54fa4224fca1d98b75531b6e8d00cb281beeb1b097d73c6472527df4
-
SHA512
ad7100d3528f11654b6d72ba0fa6357ade92ab78225b8e6771345a9212d9a412c2be5a1f0a1618a67a8cfd81f760a805c79907b05a286dbbf68acd6c9db445ce
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcf3UHAeKyLHltOxcZMfjPpp:sVnlL2R
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2554A691-763D-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0267c144a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880914" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000005608bf73960b395003a069896b790f13b6ea68f9c3c8e167dcc42a5f47fca5ad000000000e8000000002000020000000f92ae6e0b1f4f3da1591f86f5b2264ae33f6599eb9541206e12b0a2ecfb2ea0320000000c17646c4c17802a181cbe89cc12af2a0f29aa9ee621e4e10583cf8045204132d400000000cac4de5c3f641eba9b77856f3b1372701bb094f26dc310c4b11ebf26ad292de9543a7e7532af5d522aea9575224d5204db576b4103ccfd874d558ede4798004 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2320 2440 iexplore.exe 30 PID 2440 wrote to memory of 2320 2440 iexplore.exe 30 PID 2440 wrote to memory of 2320 2440 iexplore.exe 30 PID 2440 wrote to memory of 2320 2440 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8f90c9702e3499791f98c468de58e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036eee3da256aaef4ac15fb0cf032f96
SHA1f8fd0150bf313092aabb27a38acb50e1fa12a3b4
SHA256dfb6d50f20abefc04d21f00f391e73a046276000008555823b97fab1c9048e09
SHA512ecfc48925eab4b073f1fcee42b9e61d06be79a977ee2987dc45e9966f4dad4d5400a646008521679e8faadb9e8ab8693f5ec2924cf3756d26a4e4665dcd71468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c38e529547e700166e05823d18fb92
SHA1f3c6596b1618cfdbb46ab41aa0895c4d81dabf6a
SHA256901dc5854727b9e33197ddb6bfb491ebbc086d72fb04f58dac59ce4dde75a229
SHA5128b9588dc18948afd5eaee2740864f3a0f8424ab16480a72420b2333c51aba49085d12a7c51f7a974bc4563d19523ac8683cb700c723cdc027ab13d055f3f00ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79c7595ba670a0b090d9de8bc2a8b8f
SHA1b6e44f48375b935acf0ae31a00740df1d20ad678
SHA256f251f19281360c44d207f1ded8744aad84d62e93a8ec609b11e82170f7ab7671
SHA5120c7ca5166cb2ebecb5dcf540561d6b5155089d647a36cc981c5f44206952083c388b536af11addc376a81a2813c67c0bd7aea770ca2a9b1a2261378ec23e19ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f51c69e04353626fa1f600147eaf1d
SHA1e438fa9d44a209c10ce7d19866f6a8f6ba505551
SHA256898ccf64fce3ccdcd9c9f6110f009325883cda21a0bea8f26dd6a27054dc77a0
SHA512c223f44b61821e026261ee4084a22677428b63dd8ff223f1f995c3372c05120e3b78e29b6042b835f669c1061387d0dc0c31b61283906a50729d83c5c9e4bf9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ba18631bfd58ffee8be467201cd8a7c
SHA12bcc3d6b852f8eb1b7f2200e151139034247f3ae
SHA2562f0c534730af812ece0738a6b8efa12ad0596093bdca31695aa80db8e4808af1
SHA5127c0459064a5672102ff9673cd2095921b594198b77d114c741ad324e8473d371aadc82dc9b5c947b0cdc3b877989195db6b3685a8624de77a2af2ff9c6a5bc10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc377952b6f0370a1c0ee4954ecedd70
SHA182ea735a499065dfa18afbeb98637b84ba2c09e5
SHA25687d1fb41746f9fac0453635a765ea6a5ec8460ab82b7d7903a328bf9424dc64c
SHA512ee88ac773dcc277b6b28b2be3cc1980ef3ccaff80c6df556f31d1fc1424eb03481ad1ef4ccca273fa33213d5796f3e7d83d81c91aa1903b63aab2d8b56345dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c77a4093f46c315e3acf2b69414417
SHA1381c4dd56caa64f52e78be36c192642b2d14d581
SHA25694adea48c3e328f62a7c345bc42894cb2feb04c717f3973b32b303376935c296
SHA5122b834a6203ff8c3c6a7475e7352c0f1fe5fcb5382f46db4e708778653e17423d97c7cf101039045cbe461bd88a471e0b71f9685ab0cb86f3d901ee99481c569f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d701ebc1abfa95b0bec2668416dea9fc
SHA1070fe9f4cc59795e6ca450137f0adfde8a701ea2
SHA2565f71677a936094fef386da75c1232af4468b8b9cf2930bab66a31428023275a7
SHA512ef76853fd1bd81a5aaec136f3f26061a50a6995100bab2650b4d130e54aef902981fe0865a55ff49313ca3a39ade2b32884110ab3536a10522b3e6b8769ce166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbebaf26f6e729a4ee803cf526ad287d
SHA1b6e8aa2241e666779fd58ada07b8de2d070c50b1
SHA2560ab24f095b39fc14343150286fa6f12dcba848897ef676fdc040acf3d3d19fda
SHA512024554f7f73fa01b2d079728614881a52013a33e6eec0962bed8498182267ed788eec0e1240c91795848b1a19d24874f8d92823b0b5f4468bba020d2507e7bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe7ac16861c5400cd7fd247bf057da8
SHA1221e89d2ce9f47cb1cde2c6e04048154043f743b
SHA256218338cf3c641ca2ef3e6575d0d7aab6aadb5880986856c37c217ed5394e4b18
SHA512830574526f4b9467bcaf7ab1cb929dd3ff33ee47db0ac0cebbd9e972569c258fa5141d469453797f75a7cb17195ab15f12ff15a51e75c09f547aef4b803d09e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54caf87292fb484c8915923ca29fbe1c7
SHA10995d8761488673edbda951fd44ed29efcb20a22
SHA2563f3a957ebdbea89d34f9b7cf1605f1ad88a973ddc96005319c094bc79bd8de7a
SHA51260ba9f2a45e2c4ee9e967f0bdc98f7f5ece26c149967c0000dfc85eaeaa2ee5e4d9800df02276229ca5fbc320e1edc43c3b897e614411e217def359be152cbb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574db2c57c9ea41dcdb108a77d9783fdd
SHA155abd5931ba4676e5c8ae5b8833d09c82b497489
SHA25666b1096209a05798bdd788f51a505417f7d93e374f037f6f68ad9d33839ae41f
SHA512d854033d225ae030093c637ac9df35a4c494e0d3e26cb11096c80595e51bb8d9d9d0d7c1ebe14a5f64fe93650e9efb337090d2800f2890ef1e1b09815082467a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2f0d6e7633b7fbc9b1567d318f6dd0
SHA18fc579b684bf61562479a9911d6e58ac9a7d6348
SHA256a72794594ea708adacd18954664d049bdb5916d1ac154d2884dc8e77a0a4e36f
SHA5127a5f81edad39ca4541b8209bad0f3be1a65d51caaad215c9bda9bb4d864de97dd58fec37feab4ebf325e8729711191d304c7864a0bbdca64f658944c2cc339e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4fafedc763e6fa1b9ddd412f8e0f5d8
SHA18afb01d6461dba160c57810834fd8abc0fc746f9
SHA2560ad3b5844e28c8f45ef5b4119344dfa5db47f50b393612f81e00c0a99069b4b8
SHA512d263362777b4bd5744945de98d7216050ccdd49bdd5b2524e0a7d0aa4f7d7916aa193d9e6321b9aad610f86a0e54cd7267df26eaa40938e5c9153212a2d7c2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548acb8e0e17c7dde8a6b9638c120db61
SHA15f64b1755ee4e147d7b39674f64d4a7d160cab32
SHA25630798010bcb088164d36fec568d541b9aa5dc2a5ae7d4616eea23df1df79a8e5
SHA512c0df783f339bc2cd9461bc55347e7381c51a88c06179bf8e784862d75448e2abd54010d79cec552a803d68fdc72d8eec789103f3fce6a085f713ee64d97a2dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52064aae8b0e248eaea27795e1bcbf1bc
SHA1e2bbf50b6888c4ccf2a7d1b73a7ac525a697fe16
SHA2568faa1679fd9519df28af2941959b6be8ed6ce8796f7f2a05f54bd82c3b97380f
SHA5126b5592b3761933e8c01fecb9a622f2d20a7bd9a8d3c815d276950ede39ead265441ddf38ead8f9d817eea1a122855747669b5d66fc735057a5109c271c811fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a87d63c8a7573c150418a0be54803a1
SHA101425d69fa0ba6718f12765cbfdd9bae53f4e89c
SHA2568bdf66aa4e2765e6de062e9176ebbb35a2673a8ec3aad2c742434c97eddbdb3b
SHA51298fe34a65277d8ffdb7ca8475bcf0415740e67cc2f23b97a106a4bfef5400cb5e7419f40d66f2e93b2e876dc92d49b5f1cfd11871da1f9c2890a4838d5e75a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f397fc75670d4ef8927d19ca81fff0
SHA1e56f87738fe0ba50289424ec72fac605ba36b762
SHA2568d224a3ff2309d1b425ca33221210e1f85e176def97f3b1c88d95816bbb63b0d
SHA51236b3ddddb82b567ff683642855f321465642088be1b6a9712ff37d8c9208c6cc46d0b0dd68005dee9b13531b4038ba703e0c40406d5c9005ed714ab1e2407ada
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b