Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
ea90fdf84ae013b7695aac3a76e65908_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea90fdf84ae013b7695aac3a76e65908_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea90fdf84ae013b7695aac3a76e65908_JaffaCakes118.html
-
Size
69KB
-
MD5
ea90fdf84ae013b7695aac3a76e65908
-
SHA1
0647a23212840b4479f1aa39a6a850919f8b9399
-
SHA256
1923f8cd6ec647c36af9cd6893fdcf5d0ae8443ab946aa7c1fe34f728574c79d
-
SHA512
3b4f09ad09b1d4d850bc7d88bd6dcc7f4a8738b829a3084f94c2cab517910847bdb948ea60ce86b3fadaf95ec7114ba3cbab02e78c99c2d8d7a4451431af6ae9
-
SSDEEP
768:JiUgcMiR3sI2PDDnX0g6auyHmtVdoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JwnTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005002797c68d5f1d8b1b694c9229cfa67fe51b2b8a8b36033c216034d4b53ea38000000000e8000000002000020000000e780c42598b12b1e260cb368d57113406032a9aba6d131fc04521a7a3509c8ea200000000aa78ff5d7a4a3e5d2e5cde9d24774cff1e1a8a224a300c100a340a8b285ad38400000004603f483e9afa8ac39f5019a5a39b2f7192439bbc6c66d830de5cfde1521f2ebb15c6bbd64d8e682f6027ade4108e7303761c1350d6400841d605fe30cc7c108 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881254" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0910831-763D-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6041bbc64a0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1440 2372 iexplore.exe 31 PID 2372 wrote to memory of 1440 2372 iexplore.exe 31 PID 2372 wrote to memory of 1440 2372 iexplore.exe 31 PID 2372 wrote to memory of 1440 2372 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea90fdf84ae013b7695aac3a76e65908_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a1a2214a2beb3536753b3d4f379ccac
SHA1e3bb63016bd9d58e32f38a0291101b7a493e8582
SHA2568a8ee41640c04867915fe7ca7d47ea0ec2c1c6b79daf710a888c1c87f9c3ff14
SHA51223e257d7225afabe524d3dae05e653daf1c09667d22fd632e7e92854577f5afb9d4eb91dc5d390bce52762a9e77c7ecd9c8839fe7300893859b812a3fa2a3ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc173cdf44e893ebdf467f4eb339e13
SHA172d41af48023256627fac57fe1f8ce4698f4c940
SHA256f38e76707dc8c8d3743a45330713b099c3c76865b0d714261898564a4e170ef3
SHA512057455dbbd231581c9e00a5726d3373a8e66f8d78bdea4154fabe65ea1f916674a8b0fe2fb4b80224ab11f801bea1ea63dab476429ae7b82a342812dbf01168e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df08a0b7612953aafe590044bacbd3e
SHA1ae84a66e176916f9e0fe5129782538a533ce52b1
SHA256836fa38c05e3c06b3a0e0a94c694bf778d3ca573ca23cd9ab0c270bfbf7acf42
SHA512aa3a116edfed64264ca291f66ff92862c43263450d44426ad3a26a85df32a628e686f9d4060b0e23f4de23a8cdd388b423e8eebdacf204948d6e45707c83fdc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d86dab02c11287d27f8746246fbcf0
SHA1a0358a128da8946a40fc928eed36d73acf10f4a2
SHA256499cd3d322172875b534173ca38b308bab61661fcc28bb1daaf1a2d7c44aa351
SHA512d568235c3e9272809b3ff6d6b7a5ef3adba0c1d04982cc2230b17d5778330f539f17fac3e2697c6bc72f94d17ae34c17d44a296c84feb671d089b1260f827e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5866c577247ebac0140a734864d46d2c0
SHA11e5aba8f03c00a5732b8044d18ab81f460748335
SHA256738ea7a9cabc201e3f466dc8a10354498a5c0346fc51c2e99137537d45a855c5
SHA5127516200449290bc1c4c0b477bea53eae27b2ca082502069bcd72f1263d0656320d95af200b46401abcc00da7cdbedcc68c35b8987d838d61894dd4ff3d9dba74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ebb3fd73c5c61c99c204962bfff635
SHA172dbd2b51fe5fc9532a691e4e0088bf9edd8e625
SHA25638389a36b0da034162621c4757b861b01eebe2cf830ecd82c16f26e01aa680cd
SHA512aac0a942c52b0f1759fdd35ae631541e0859e4d59725971739e4c5c75de5a4284c23e72c5f858fb96630fe729b6824e2916353265b5524f8198592e93643e77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550ca3528b4895b4010e35514dd7e99a3
SHA15927cf69c8e8cd35d8fa420572bce9d6218b25ca
SHA256447ffe570eb988fa23461ac37dba54c3799c2c079e90248448d536d360fc2224
SHA51263e9cd5060d17968b74716a48218d93e79f9e6909e15597d7f73a2c453774f6c45c93408bf1c3b3534a48189052447b8eee8c0e27e3d474ea56b817d99ec2acc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d1b1450250531bae09b334a52c8b96
SHA19cd5d337f8bb4a44faf75588aa78c158d5d7dbd6
SHA2565279cde7c4f4d31f7063689194be943407df46bb2db85623a7e82263eec94fbb
SHA512604a9408997802a549e35372898ae831a67557745e0b61a8467344a297d7fdbb0e113fe76af7f062aeacfe9d7f8d2c19362d091f16e7d4633b93d6615002709d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a42ede4740b3e894615faa400189ff1
SHA19b627c7e0a42e6baa0954e347796ea7916b41688
SHA256dbe6929cec7c821f621b3c00d340eaf5755ae26fc5d708d8ae29371985015510
SHA5120eef20a613a8b3e05ed6d80d886e52431207a832b813d4a2a544df308af163e46eb22a91ce733c68e22062cf48a35143fda921781e0304099b58c49dac775b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5ae4823df3eb7def713ce54c3665d8
SHA1b1f7b67a95ba121042d4c84cded38cb36ac63a19
SHA256158db6f9493ade12f8a1d0ee17b44fd1baecc79ae6bc0daa1f85b8b314a8eab2
SHA512f88d955c3da9e04957bce5a13cb72801054598683fce5089c646f8fb43626a6393c7edc83c544fe7a633ab0ef763ea88635b219b26031454bc8b2e08e4c4c465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0412edceb550fbe688c939c12b69187
SHA13d0f464c4d9e36cbf20ee606f58c2df75da65b0e
SHA2563bda3768ec7e6db2cc4545678d180a42f56e528e563c637130d7376dc60ee9d2
SHA512126301b1525a5da33a5c29c1d80b288943c5683c6c6fa546c23791eea66434ddb647871053d3d6dc059dbc6c8c460128653000a429d473998057e2a3577e9adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03c79dee02e694b03a1cde89b02eee0
SHA1de642ce7437fd6ffefe41c9c95b5388920434445
SHA2566930cd433cfb7250680283a1c597ceef8053a7a5c61c211b91930afd1a33b2a7
SHA512795d1bb134136952389b366275d3234b7dd3448f3b10dd38b6baa3ef22b1e4b64fd8d4e85c1d92768b757fc3975e719c15dba5ade904ca8cfab917b8116ce60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f79da398cf5a11a0da2edd374373de
SHA10a85cc4a2659f2b347cc3bc941dbb946012cf9cd
SHA256a5538358696fca6572b58fdb16981d1f0680c1b43b10c4bd340a5aafd5506d5f
SHA5127e82cf5a73134b9e3256b3cfee1fa62595870827f9a408d19c360ab03d22a51455784b34599cbeacac38cd330141f6fd4e5a7a8021ba0e8fb3f398b9f9a7cb0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5924c31fb14b7b962c06c7d6c9526c0df
SHA1e5290908e6245af040b49c38e058c4c7caa2da2a
SHA2564c0cf5afb0a8f11c53dc0f98866afa400237c4ec44d36f534a5e351367956e9b
SHA51240e9913cf80ba933af93f78575915a4879353361a3168cf0deb805d333825ef08f29172c053ff9d791c4bd83c6d465e9bf73c9b867509ded2fd5a98d73f834a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3c503bd08cc4295aabf972fc008200f
SHA1b2d35d225d6be34ab632fdca6ddc7bcc893db826
SHA2560f80f818a539f6c552eae3810c94c18230bc0bb77aa5c66237f64164f95f75db
SHA51270a2672782c5b116165bb0b6a8e1bba74e68dc03a84c65897b84cd072bc602ccd271df9b4b8e9a09d20a6ea352750445ea51389f8ec247c2611c30a3ffce3ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b966153d2c20f02731e340efd4a5e15d
SHA1afe7621145f0c15b32c181433cebb3df32b84917
SHA256f40b1cace2a150d8cbdfd8b2aa9078d3b9f2d692ec1740fb99290242bdfc1a9e
SHA512c4b65f0df50264b98290641d4a21e1c30f7625b4c7fa6c07dece32933dde5842c2b578fac8991891834fff7d1ac070c7def5cd5d83a81efb49d549b8026ef1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e88f769dd315a51785d53b7746c619e
SHA1ea7ecf78771b89829c87f55a451b068831a57e32
SHA256913b1aa74126237889c1d840dc01fca75b5bfb338b8936e968bb2eb8f17c1a6b
SHA512c5556b63bee5b09bfd26b727214904d82f9e76a34e30e29bf9710e9e643e0d37bad003bdb073e522ac7137357f232659f9558145d58e013117a56d65592bb883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e11c0edf8cd334e96a00e718c57d762
SHA139da1279722e932b91de44da30a12c3cc67e518b
SHA25603622caa0f01878ba200c23bef6d4e9c5b72a946db089a2f1e39d2e90f6fa8ff
SHA512fc42dc5c2411284c0cc21c41256085e480a569b220c1bbf60ddaf8c34c0e095b30b80ebd5e6c2d75565347f5824cd029ab1be67fd65085c4bba1814d2bc610d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d7f4905c2a749bc84b3ec1707426c4
SHA1eb48ed946d207584f9f6a52bc2fc96b6a4bf35ea
SHA256f39b97e1348c963b18ed3783d7378f31bcf7a2c1b81e0d45adcfc23cdad445c9
SHA5123080988071af617bd9501299f55df9fc76adbd4859a9edb3590c86ac9b732d38437f1c90461117e039b493c46af0024ebee49a78cc304aca2eee150c774cd3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f301f7c9e5f064baf821560d82da3e2
SHA18bcb82fdd93fafec4d6c64180fcc60c8e9619f52
SHA25694529dccf5ce0aa14836b032bdb72ffc645be31f21f4b53cc1c8e305fd8b76e8
SHA5121f1fd4d0363d17e87cf97d38769982887129d28161f9d88e64f94b020b7bc33eced6b952568409d30c96583942228788045b72da7ffba34d16015278d6ce40da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b