Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
ea90dae32d5676a22de0cf9d882dc56c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea90dae32d5676a22de0cf9d882dc56c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea90dae32d5676a22de0cf9d882dc56c_JaffaCakes118.html
-
Size
11KB
-
MD5
ea90dae32d5676a22de0cf9d882dc56c
-
SHA1
dad4d2e5cd0cc987c07b65c68aad3a63813c6962
-
SHA256
5f205aa3db75595952238137365ebe062e3b665b91ba5c9a18e1ccd25de7dce5
-
SHA512
9a4f986c3abefca746966c1de45c9896d0f541961afad05ca2176be9dfac55c21f717fe5730203e33712ccf5ae6ad81fa09550ca14179a98ab367cf56dae91b4
-
SSDEEP
96:uzVs+ux7DDLLY1k9o84d12ef7CSTUBGT/kSxp9dk55KL/kLSWVkLulVHcEZ7ru7f:csz7DDAYS/IiWQaSWIuPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E248B891-763D-11EF-B954-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000003adcb2f556d1eab23a3bdb8d79dafe7afae3251479c66e5054960d0e5f1cc81d000000000e8000000002000020000000e8746d05a6ede5ca2a37143d7126885808e9a7a84db41203277af7e7afe43f1e90000000683d2d0ed3757ff6fdeb18c1ac7e407291317f71f290e8ad3569e6862035698a971df0934d2919709ec3bc7e66f99aa685db27e4c6e975de94b44413ddecd74ea1117cc10385d21c7ddfc74ece6c41306bbfd571d31fe5ada61669b8aa8ec129d802f683ad207c6174ab608ccb1cac21ec16e8a23f82d90373c0389f5a0405f294c1fdb63e58c48184da538de70bb92840000000cd019f7b8f6d3752c6f75e7294f88c81906541aab429b566056ea02905f8b92184d0b630677d8d3ac44c582efbc0a84f1f0e8a653112f2def9422c0dc62e3cf0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50774ab74a0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000007d02347006f715406c9eb6ee34a50ef287062bcae14b3ab9d9191d08385865fe000000000e8000000002000020000000c9ce7e7ad867b1b0c7413fa08456ce2f80f4e6e24e03316b7240c8c296bf381e20000000937189cc7bb3eb6dfdbbff62ecc4974329fd515486ee6235c895fa4bb232f84a40000000a3fd9972b004fb9ad8a761fc338a5a5f40504045805903fb8c220d7acd846d3d8b17bf5d24e3c1c67b9eb7cf21c28b9e52233b6d0965bd49d66f58caf7470fc4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881231" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2712 2148 iexplore.exe 31 PID 2148 wrote to memory of 2712 2148 iexplore.exe 31 PID 2148 wrote to memory of 2712 2148 iexplore.exe 31 PID 2148 wrote to memory of 2712 2148 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea90dae32d5676a22de0cf9d882dc56c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b92752f6fe3efe7e1e91beccc71bd4c
SHA17ed08279c67217a61b2ceb329392f52ce93ef5d9
SHA256c3bcd6d9f00cc94803723ff67b70eff06f97644978553ce514b4593712b39092
SHA51231d6d89f4b08b71d70163721004c755139570f234786c91e57d490a00a4260660f6bb425bd2918f70c221f0cc32d62dde7d998b44b2e9d2cc683fe59b4a1cefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60c17cc199288de24396b07463d93ab
SHA176d54963279204d9a85410fb4623f82afa7a2fc2
SHA2560a9897c13c9fe9c9f2daac70f1cc4a02494c2cbc5603c28c026aa5054eb2e9e6
SHA5125b337266c4e766525b7bde575453c6a73e5ba86547cf8b5166858c23cb8f383725e0bf0c02224aec13cb58a8b63ddb15d96b4753e24b58af0d127dfa931ca950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5238def3148cbac3784cd2423cfd0fe7d
SHA199f9a369e9e9f0668acd7caa75662f33f6e7956d
SHA2565e9b7035cfd2a2114f204baec3477d97d80244cfb1d490ed98517c8729970220
SHA512da4a26046b983b1cfc9d759a1325d6d6eb3cabe4d1309a22057d33b5b90713a31b1e204d1f2e85794e10dbc358bc6ff3d6c51ea437fca39170cfc56c07e450ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d716b2d36d20a2a118760391787176f2
SHA159ef39d45dfd86d75528126c3d6d5b47537021f7
SHA25671be5ff498e1eba6551c8ce9781bda89de5bb8d2192e680bdf8a41e7fc3ee2d5
SHA5125d5e515b518e7137937c0774bc415f40047bbc9c0b725bcaac65094b3fdcf0044f3b161809d51761af29755afb96d1985737fc6e6d3a7798838904f3c50e2b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c7df844214690d0002d3f9e69a99d1e
SHA1e49f33cc38eed71dec4234f0ca73d0f7ddb04a7c
SHA2567df9dea0bc0a75d29bb37cb155e61df9020ce4e0296f66f2b0f483f64b9fa2eb
SHA5124530d278cb6e9b13531ada33ff6582acc91d68b1225233e209a7986f3c8a0db64356c2defbed3a55264c397e3f39a65ab4ad16c168e585e0491bce58a003ace9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f97f3bde548dacc27f2fd490b8f85ad
SHA1cc16aff8104f4fc49d96bf31ecc774406751c853
SHA2560fb98ff06a164adf64dadf4da0c07122dbe6ffa99a40936a9a86d92a208fa8e9
SHA512e3ce361342e1ed7c09a6b164782977e7d020cbd33a9e3388b1cb61ec05fdf1bcaa03b115033f936a5358822d01ee934daafacf2f3af77cd60e182a0e51d4df80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58806a20c46dedca19821c9c5762d41
SHA15206f3849fe164ef2e5372b51cccd96d5248a8f6
SHA256b03dbed17a98e9b0b8316ca575c618ef57e2fb2b3214ef4616304f931cebb99a
SHA512f5a8cbd50e746b573cfe6b7d4e64aac2482438ea881ad336fec732d22cc9c16b7ce7b30c242709a5d546d7ae52c1b178b75533abcf153250a0870c056d637880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5373cdda53697a2bb489215ef52574908
SHA1ed43a1c5ca8b9e136168a1a5ea547976d91758d8
SHA2564e682c6422b667f0409eef9017b63f7484e87cad1a3b9313c72b36c6daf0ba8a
SHA51248f46279a3bfa64550d4e2769bc2d255277352e566fa6599bc16fc9ddbb09657def9b32dfab3e9fd0aa6fd1daf5154ebe8703be42f21b41b3f196e6e2409849e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d771de46006ed68645b8674dac561a
SHA100ae0c87d75625b1d00012afd639d161f0e45fd2
SHA256e66a2c040f0f0faf656e70247c64838e8792ee9037090c2efa5d05b01cbc5953
SHA512d62822b81154a63e451b650427f0e98b65aa10246a6fdccf40e050f813d45b93153a6817af9ab771a3f883588d86cf12966a4ef55f072b92768e945bcba4cc06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5238e74e8463a65504e139c98f24f068c
SHA117f97c8724ca47381c8036bfea2c5489b730d6c2
SHA2561af7e9635c01caa98746105f2da78c6a6ac6af895114b2158ebc7f8d96e80094
SHA512ee9382d3ab9ea09fdc8c98450e4a67b434cadbeecb9ae1dfee9a2c9e513390c74fe99931f22f11bf3ca0c1d311895d3cc85229ed2cca6e74d4c78e09d3b2b9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559c71c2fde125247d9cecebf6eff461
SHA1490fb8c85f2467e6da300fe12afe8e76782ad5e9
SHA256155171ea604ad4fc06b2b3a3b9fd27a981e6c2acd80a6921b8ffcb6e38d79ab4
SHA51293edd68e196721742c79969dc22409b15c91dcc9350c9ed25ce5862bf6cd7ab6da4a0a3132c7254260ddcdb34b187994f7f8de4d32075c06e242da1fb85699c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df28fc78afbcd8fc13ea484f45663661
SHA16f08ee9ae600053a02b8f228a622d1e8381d9529
SHA25684b9c57473681cd8331ad61aef0095d87aeccfc5c8005aa16d731098270f4f67
SHA512c9823b3f565dae2a8e7e0401c4702e1e35464152ab9ebf47a11242ededa94e2ab36d8b100b8cca32f180d5dddf25b1dcf4ee450d3675e6d1e0ce80ebd53a7af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1937286af74c35c4f445803521fceb
SHA14e5248efd562f1ef58bac7c1e700706ad26b8504
SHA25693dad17f869ba0b240ee61e045afbb2e63c61ab097de00956bdd2024f7fda89d
SHA5122918aee322804e340be13f652f9a1b5481c6b84a589f3f915102fdcec55983eae0b12bf5361d56c79fc9fa18c3ddcf0f80e3998d69c96f7f3478cbe332f62d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9a05a08868d93c48e0f00944ead409
SHA110dc703960d628c6deb57ab85377af5423bad8e1
SHA25636f9aa0f016d8a013993c20f8965d08ae4762c7e0cbeda0c5ffb49fdbf263e18
SHA512cefb9fd3008904306b945d85e38dd643c80b03c31b2985f9bf662359d1f1b54e4403e299583bc61e82b4002336df50b5041b8a3ec876a04d5377259f066b70e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a605c1751556e62e7b2ebf67ebd1833f
SHA1e4c0acef2c87a747072df24728e55fc2abd99326
SHA2563741aa0a89dadd392850eaa495eb7fe6ff1dc15c9afca347326cad955d71e650
SHA51270e9e4ac8ad42d32b43cb0731e5ae178a3f0d7419d1a36a9579939ffd504114feefdd1c8ee95ec27f4783e1f2814a868e017ec2a8ef651fd33c5af005a71ee72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc84a897a7354e8b23d9dcaa2a7e260
SHA17d5b05f32ab1d931d676faa4a35f301b4c86389b
SHA256846fc68a0247e93f81eec2ae4d171557590a55d9a71db05ce17ee52e4cb8e8e7
SHA512bcbd1350cec0cf7b9b7df32389dd10a3370335f29037d585aca4130296fb5e647cc239efe8eb9b5970a0d174bb2164f680607dfb8bf92459c3a8d9d490c561af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b99d04d22b0da35d9ffc61cc186356
SHA15df867fbfa6d1a15174911fccb4887d61bb92d7d
SHA256400fe22f17b40182f9122d550811e6e6bb0f6a14e774989e00dc7c6b11483af3
SHA512289495c9a35bb87a524568957a0d681675c333d56aefb515d97e14132a6dd4ed8830adf48d2d98bb49b23c7184e0c530a93aee9c09a1bcb9f38e395de34899e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f334ee979d697f33a0ff7f0f8dee2ee
SHA1d1b4e79d2f700a46d21f02b009a0f74f4943d218
SHA256fbce0619db9af73616210640b6d7a9c4238505070e4cc1c690579bb62cff769e
SHA512647f8f3787614d23fcb92cc8704f2389d1c4aebb123f74b3523ce88bb707874771f264a18243615a49dacca758b2930792a3b03eb8580dc14337bfe24caebc23
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b