Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
ea905a30c650ee6c58fc6304fc7be847_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea905a30c650ee6c58fc6304fc7be847_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea905a30c650ee6c58fc6304fc7be847_JaffaCakes118.html
-
Size
24KB
-
MD5
ea905a30c650ee6c58fc6304fc7be847
-
SHA1
98249c38f2abfa97838b1544c6f15bed012dec04
-
SHA256
cbde636e5a7e09c02fe9146635c9cdda747663bbc43321511c129f506cd5bf6a
-
SHA512
76b0504160ec9866919b2a66d76552431aa7ed3be04003bf6e6e331dc372def71433630493f541b2cfe72c3f2c2f2dccad810e62f0f5736d43590ce1cea74219
-
SSDEEP
192:WLZLwKQZUOgc/h13UdQ/uQe/W1ThlBllC8B+4UinPi6bRux5WafW8OhW1ThRxZ9s:fjU2/Ie1T1Ff21T/xZC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881066" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000077a212fe4ea1dab365d8aee421576b40ae3c0ffcc55b6ea113c7c53ef6d643b5000000000e80000000020000200000002f706f5601f670bb69b1f91fbeae1a67059e499dfa65f4edfcc53b805ea3452f20000000e87d33017212cabe243024e8fedac5cf94d6385fd193bad9f4df4092ed778ecf40000000ccc19a4da470bafbc90aa5298c0ac859559c593e37c71e2e0dbc05914ea02c2171805f47c2ff7224a82e59956d36ba1fda78e19d8c933e3c783c0b272e92284d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FE772E1-763D-11EF-B798-7A3ECDA2562B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10727a544a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2124 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 496 iexplore.exe 496 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 496 wrote to memory of 2124 496 iexplore.exe 30 PID 496 wrote to memory of 2124 496 iexplore.exe 30 PID 496 wrote to memory of 2124 496 iexplore.exe 30 PID 496 wrote to memory of 2124 496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea905a30c650ee6c58fc6304fc7be847_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0cde4c3b719103ac09fce03927022fc
SHA1467e91be289c78ab7605e9acac097326a43eb2be
SHA2567c103c46ffb3342106e949eeb81433406d920d6d335557f3b02c546478a3be7c
SHA512b72086b6bbb509b7336b527d81332204eb45972acd2bf26ff0de86961212d875f53e3851d367424e88c8120365e7d7e4ac2a609dc6d635c0804d54927096ac42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea526dd06bcff5a1dfe82929f838fe69
SHA19ae94342b6362f1818045aca6249d595cbabf365
SHA256d8650cb9e3dd8ab1bd60e3b71e5f64f6b0fd58f4b3ff843e157ecb5845e92492
SHA5128ab980078f92eea58a2f4cb742a4c6b5f1716df4c847da9cb8f9a5c5896d92d762f7db7907639979e77936370e56b4cbf93466391ca1d7ff86e9b46738a1e212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eacff100c81834f5b7f5e425370c28da
SHA1909949824daa30cfff1b134a27275439efcfc9dd
SHA256f42e25d1a8f5fbe5678d9cbf584319e0cb4dcd7f71a3f1f193ac209c0ec03c66
SHA512a843a8c7ee4181cab1742c269de17ce77bd04369e1ccb6ca469626f764acb5c07ef242cb0bcd1352a1322837d41ef50ae8263cbd4c28499122925188871f5aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa5f4d2d355e78c618f4315fa374cbb
SHA1103a53d9e00d95aa251c7af64d3822cd3d4110f0
SHA256abd7bb845345191ecaa904fd25e80a8a7cfaa5c29c3cd270545322598cee1821
SHA5125b8938788b0a6e33ab5ad2c4d8fb00e607dd75f8a762b7b381d76b40e881e4417f923d1bac37cfe00301c4146703729c286ab69f8776b4778a6b5e7547081f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516dbbeb22a508ddf1e2e5028bf522b00
SHA1f69e2c9fb0df1bf3d5d43ab928d8413288008680
SHA256a7bd3e95ddc5f921111a755b00573499b16ace56a9a354748a1c45e60563ae7e
SHA512043719127043b7c8ce8d20e226ccd5153583a12a710bb84ba3f128549e0e9638ae2ecaa4880a6a300e90ce42ffcfeaf2506f4b369efe831c2ca536c595fb9430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598064a6d0f0dee8c4157dd6da9353e86
SHA1c91b3c84b7e2717824b9865e69ffa300ae7eb915
SHA2565da0a6b422559f981536ff307056cf13d36237b3d64fc639bbefb2f3201f9a70
SHA512597e803507c88f9ceed84c3d7428780f1d979dfea6d72ada4a6b24980e68c1ffc680483f6b25ab681d596c73e3ed6a6f31903da72f040cdc8bf80810284c21e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1a1c36a4f8710fee678c97071f8830
SHA1932b70359ddb43f59609b087bc4cf1e19c83cce4
SHA256837262457d1cf5b3d0c9715fac7a7f1defe35bb1bc544c2d33ae9b8d4a2e3aa5
SHA5123178359e94cacdfee19a36947575dc890523ecea696b944d07ad0cbb1626f7b2bb27e38bbd65544eb0998a0402fd8a1b5d4f463e51350e0a65282303299be82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d24e3abf852edc5f8f24f130e4fe60ce
SHA1134cadc8f6f491ccf2cbf53429674e929825628f
SHA256937b1896527e67acdcdf29c2d287920d99b9f94f91d22252faae4fc5d595624e
SHA512c8ac3d3fa2db9a6ecbd8f68fae2b46e75c2268724065937ca993ea3447e4b750b28e983bf761693e5a61fd8f81f33bc8b276d4d816cf2035609caf0e69522b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483e2c5d7315e279c1395711a935d089
SHA1f1ac82a96c86ba47574282178680d97eb9fae301
SHA256df78d2910da58461d3dfb05d3e2c5ec9cd6c0b681fdda1e97b4e2db81d1e8cda
SHA512d6b776898915d3d50a581203e82311253716d331f7d3631afdc07c58857a9843a72cab83d2edcbedba6f809a60065b63e5cc9084ec5af5deda39d5f3f675cf01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56fc8bdbb97d7817e268d3094834d63
SHA1e055fd680fc360b4db1216991705e31392221205
SHA25619de93779140dd53d35b70589a100daa8a932f32f84f29e759be8713b2cf0bca
SHA512bddbf37c01af98880067d01f2e51efcf6ea151b8f92a9e04a7fedc2839907ad523680a1f52ad9a36158683c9f377cbf18af64c440c67586be2de6bea989e0b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a36d6e9edc6d241196ba7456d4c0ca
SHA1d9eaf601351931d487e7a592e7b978a0d599b59c
SHA2566e8ba5990955b27aa7fbb1c8cb5fe5b95868d451458ec03fe7472260b8a3bd62
SHA512a9ce70d4c78e97bfcd38014b913400ed99d041b8a5ff8d41a6d2e3d1de0d692eaa85e3dbe6088ec66bc67aef5fb01c617e86eedf06f310a5b431e34792c0c7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c226c8f06a6dfefb4e23115c3b82453
SHA1062fe7fd1dcf9de91ea476ceffebd13e214ce175
SHA25614f8c1773046579d694dc68eecfbdb0864284b5d42b4df62d635576a4a89a85d
SHA512930c80b2ba858a7d830dd7bc29c43f3fdc47eb3c95163ca6fc3a1e4a0458de9cef014e5657966657f71de4fe0289eb95960b75201ee01ece5f2ced0c176acdde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590da49c3102df1bd7636bfadc91d123d
SHA167a998d12b3790c2f7c7e1e607e2545fcf397fb0
SHA256a6c7c82f001e7e1fffa2191f04610a8dc899c1ad2fe898fb54b3451ea6407827
SHA512ef927c5050cbcfc991114bac391f5c80b828a1ecd0ab3ac9b1e4ddce5ed738fb8e0eba60b2a6d5dbc9a419b08721b064676b063f68f1589537c1374eb22a3a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541685428136e8dcb6329bb0770d1eac5
SHA16ec85c6f82506d6ddd923fb2a1e5cf32645c36bd
SHA2567f24cfcfbd394caa5552df92c90f7e97431032bee3ecf8d0cc5b4a0bab25707f
SHA5128ac0915cc9224a950000cf9439147a193253a6ada4b8552174857a48bc6adcce5a0fc6156050439349b5dbad7409bf3dce658dcdc546d9cc469725c199d25404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504d84f0d720753f0dd47ab006b7d3449
SHA1b2352fb7b28cf267ef15165e6b6e8b285e38536e
SHA25603b1ae87e44502aac52ba963c4375c9a8052fcb12c30e3254bc9989658a1d62a
SHA512bf64ea66dbf8074e4483d9a5edad8413e210acc0e2581077ee6a37cc982603229167ccad5ec24b99e3efee741fb62df82f0c61200ee25bdf9f633ebdd186a474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471852915fde62d513c2cc343e76e842
SHA12fd349069f895032660dbba016f9ab2ce53b83c7
SHA256ebc0c1375a3b234fa68ab0a756804e927a9ca8a6070fc737207dacf655f30a92
SHA512d95e65b275f5cbca3d0a7396c37c8a19b21531e9c5e60226c9ff61afcb9b34359be37ec15c4f69e486e38b9791ce63bc31e06daaaa1d85b0433c42a3a88db1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ce2239662536084e9672d63368a7b1
SHA1af36440227acf0288882208e2954989621ff0074
SHA256c7b4e70832baca0d0845b73b688139d0d34e3598a6233bd9f929c3a33eab3481
SHA51205a42ce84653a020357c5b6c8d17c1bb6a1006341943f28ec1bc30c7e2cae5fcf61cd8ef0f416a72b3c8abd337430eb7dcdb81d907b96b5d4c2826473172b976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d60a23651e87a6b1297215224eaac8c5
SHA1edbd1e71997d9ef0906e18d9c12f835ea5e5d12b
SHA25672ed3e3394d61789011f56fbce8016e82b55868574ab965364bba268610a0b43
SHA512e548dda54207cd3327ef47f1323a26a2789fb29c43e2c56138bc83338a82d352eabb2eb6e9f8e93be5bb47e6b0339dcddca6d5e538753cdefc984c281618363c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e8f3ab5d3780d9878e1fbaeb6ca52e
SHA1f87ef361a7b1acef4564755851fbaba6fab6fcf2
SHA25662f0ac5a1ac5f5ac5d40a424bb2e053b7b84f906d584ee2919b2858a4ef8f544
SHA5129232019b1ad8734a4e9b914b8af1c0ee7e32c4e4eaf415dfb790ed73b16b9e21dab3ccf467dd1cb8ab3e0ae4e001aa03af51d036e024c6ba4f2d89e4e0d3899c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b