Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
ea90e5ce2daf0ca757617848675274ad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea90e5ce2daf0ca757617848675274ad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea90e5ce2daf0ca757617848675274ad_JaffaCakes118.html
-
Size
23KB
-
MD5
ea90e5ce2daf0ca757617848675274ad
-
SHA1
a84bc16c5ab39c8dcb3f9f0df18b9efc59614bd2
-
SHA256
e2b422cfeea49392bd464407099fd6e8fd9492695e9e9e87447963bd92ac5a69
-
SHA512
eb35c614ad4ef9e8889f069b5e10f2cf9f0fa384a0781c90b13f70d4c3ef186e8eb953e6ac976f4d5c3a3b049d5e77e6f5e8a0ecdc73a7d69bc1f5022ec2b9fb
-
SSDEEP
192:uwHgb5nHsVMnQjxn5Q/znQieiNnkJnQOkEntZxnQTbnJnQtBXQvMBCqnYnQ7tn5u:HQ/Sl3y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E675D7E1-763D-11EF-98F1-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881238" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000fe515ade590805c9d79547da4d104b104d5855f7b96339f91a767beb81f0dd4b000000000e80000000020000200000008ce3d7e19f74cb0a40263f484b62b93ede541fc9cf093b2d649ba6577685205e200000005be8c0be064fcf95b6f46e85e0d49395169ddf8b32c030d0640b3dca1967554b40000000f10b961b4759a12307ea78a7487e47d1baa8622da209591dc49d84ce170f312c93b6856c8f47f7777e6f5e6ffe1c4ac7aa5122cb9ef3495124859796770ced8a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000824bb4a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE 1644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1644 2408 iexplore.exe 28 PID 2408 wrote to memory of 1644 2408 iexplore.exe 28 PID 2408 wrote to memory of 1644 2408 iexplore.exe 28 PID 2408 wrote to memory of 1644 2408 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea90e5ce2daf0ca757617848675274ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2faedaef65cc8425dc046a3774999f
SHA18d84d49d7b354dbaa3e648e3fdd4f218ad42cb99
SHA25610dd67fb3195c3584b389e2442f0ecc2fc53850b31ef01a3debed5f303b87bb5
SHA512bbd797ea8b0390b0713d314e63fca67a6526bf9d0f5437f3c4be04b31b4f7669b4b148af414d8077c9e3a6a8bd9c4deb1cfb1ae2225f08a79e53bb4179d1ee47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560856c363ffef3e174d5a1c88fce2f73
SHA19040f920bdbb73fd46bd240eee256e039d89517c
SHA25673bdd2aecf338604170afb999312f2dae0e17905b759a8a40a9957dd5f30760c
SHA512ffb75e41ba45cb9a8d8f50d6eff4f67298ee981dece8c50f0628cfe4a283a83f35115193ca7de885521d275c87a4bf4144b8786c572ad0255b05785a4f19e8f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55167c33214a2e80b22ef6e698b7a66c6
SHA1769a7973ac1536e6c605dd418e67c743eb0ceb16
SHA2567551c0a852569c9b1c0e922fac9b443220d6041366cb394ee2d580ec37e36042
SHA51241e41db6e91849eab7780b6ffb101695c1d4d1ecf398f163368dcddd2e8a202c26ce18c82974016e3ddadcb4b66ade1adaf979cacc4c654c6d79832eb952826e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43468f35dd1ff07b4959afa2eb609b7
SHA1c72ab7b1b6655cbe59d5761e87bd928ed0fbe082
SHA256d932f04fbec6b491804b149537d471ac3802dc26e8ab7478571ffd8948cb41be
SHA51243d63c962f9dcb3d273b3553d5f0f1384022b844b4c34c01dce1de8eeba72b03ca2b5f23d1246b413fadd7b2d75461b310a0f351f7f6ad503d9d9f8d844410f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50222018aa8e3783bd0c5b5322aac3d8a
SHA1ee94d003cf3716095c57d4cd1e1c839000bee750
SHA25644ed4bfcbe9023c5f3f0657d0b68590812b768cb9fd856c923dd0d724e8226be
SHA512b5d4a5b362cccad1571cc84d0ce97a9c8901a64c1dd987c6bd4b2ed500151e6ea1a16c5b8d4b87f5539cab5e613f6404e43caccc994153b97d5055c7ce7cb9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa20205db20fffbe82d2a590a63354b
SHA1eed1b8f0dedccf013fa758e016eefa3aa7bb3c0c
SHA256186791e233aa4bba498872eaf52d1c45f7a1e70b5b8f2d3e68f5f337f1b2b6fe
SHA51243499e726ac40976b68583b16cdc37006014d3e02b3f61cf73b16a61199a8284fd1f084f49e28ae4040769d691b32ea9aec1466c8b5a3bef8dd6f91430e6bcd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af7fbe09a76b625eb62629feabb9ab5
SHA123865a7e6e8bad3cea2a5a39069342e0b433948f
SHA2563167e0457b06bcb8c509ee42e1275a2acbb4c52d010bd6afd1dffd7f21627df5
SHA512ef49ce639fb08a2eb8d8b4386be755bffe4dc81210c43e17f9f2bb9e8b202d39d192af6b695724b2fdf660f20e54e98c1b5c64bac2847a9c81b4c6b7ee4e69f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5925beed95426dcc983abbcb9930220ea
SHA15c7893242b74d0cbfdfb3eab8351fb3bd522ebf4
SHA256fe7782b6648fc6619d6779f144c730f3e799583bc6c2a4ebb1aa460847331e93
SHA5127cf46b59d5821cdf90c71b3d48612ec692c51435787143704114ad6cd6e285ec3b473aee5bb10c17f94e98331f45ac5c7038b5fdf6e543ca5b75f66a4313230b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68f81b91f460d6242aa128bdefbe48d
SHA1e7785f684178c547c13c7d2f32e5818a7164394a
SHA256a4c885ae9227a487bfd78a224be4709207d5cdd7d2fa7ae74d705a5759c58a14
SHA5129e22a60893a6fba68e5890513812bc06682eecd1c22fb3ebfa2f9771332b0e688f0e0b998913cb88cb86a72bc174b5764bbd3357a5c4def7f90310d9a1239cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c600335f1d6944be48c972169bc7a28b
SHA1435838ef49e0a7f19ab0902610109a86509e1b24
SHA256aaf6ec527823e44ab0de07450bdee842265970c7579ec19702af4bc59bd9c0ac
SHA5121639a1fc8c83aac1f06c7efab876a93eefefae6ea961e316c8d9ccdaeb1b293d0185bb8e9c6a973308022aa3e98e2a82dcc6e302e3caf73995036ff395360697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b791c31ee4f1aec4581bb2da1107a17
SHA1f28f025ca2c390e5fc52c8ba1eb08dbb046cea58
SHA256ccf2bc6c6010088dd8a8611d0051c736bb0886abcf1d1aa2054e86a59c70e871
SHA5127b89b9dfdc1418e56fe18f8e020b896867ad253aa1240733cb76e6bb3f9720f30862fcf66467f4a3ee42358aa58966c72df7cdb2dd3732ddcd4e34dc0e648975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4bb19dad05fa45d6a3322b5752c9210
SHA193c1967c0a0b7458bdf95e3313f9b63ceaf09803
SHA2566b5413a78685fc6c7fdc2c0c6abc129c53bb8365f94f3508185c0671f1112567
SHA512d9cdff643ffd35e26ec448a5a52b886372c460ab17518daa61e7eb3749b0d0b2de2d79a4a0715854cbd4b45a9feec77672ceb7e5bd3b6130b826fc3c51eb9f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079e677eed2510e4f1be77d49956082f
SHA1f3626faa4573f4274b236dec130aeeb38b7564de
SHA256fcafc2ec64892b591e3ce2c9c77a4b62c5d1e8cd95f5bf18b95b7579b2e207fb
SHA51221e344b9d4eec44949cc811bb4a8c9c18cb2b769cf02da39f39c307cd6d81906d48f6d044b7af6c3bfe277da829d54ee5dd284b5d8a061ff267f758b8ef0392e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be00cfc35296efc937e3d1debc8a7ed
SHA1e31be1699d2935751441aaa0a4bcfd8487c487b0
SHA256eafaa30b0113a2d9ab7baf9d5d8a5ad3eb876b90931a230c2bafefeb9ce1697f
SHA5123d726c6986ee61d569878fbf9cf02a8d030de1350ab6f1064cdf5584be9343feededaba4aeb5c57d7dc36b3b217058911fbca610de2bc234baf56e22f2c8b8d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318c92623146d2f4b85547a527a1031d
SHA126a5b26386265b65c9660e9877380013242c3b5f
SHA2568bc77ed7281700d57a2e05126c2072dc7aa4de254b7a984a5bbc88a377ce6538
SHA512eb6e4b9cf2eb66526f52d20738abfe3bd04b0e74afd7025d846c02097594a1c089215c95282345e386f28c8bb89b0b1c0b24fc3a700faf0f9d9db11f1304eb2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5032080421b396db9d81beca56f02c438
SHA1e58a520797f21dedcd758eac0d98f19178d3326c
SHA25610e5036ac67727c132c515d646a687a8b2203b519c6f3291c552664d7f443ede
SHA512a6148b531812a066acb332177a45efa49e87a5e6d16e1516614f706c5476fbce14bf73d5761e26fed1e6268fc1256c10bd3ad2e4184f3a4f7c7e7bc6709fb28d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537d2743201dca208248ab3a33b541e55
SHA130210cf33cf8e18ae3656b14597ceffe146a4903
SHA2560482d4c7ab065ec20f981b6d37fc7287cd0eeeb143f2d78a86f946148e6d7605
SHA5125c349daaf1dab3be172109a2d17d155fccb0c93e4a33dc89cb83ad4e25b73afffddbe5c0beb5ec50dba532264266e81f0e3f58c5fb1ad62b305fb2a3fbb25d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d02bd40363ccaaab39f29c4044e3e1
SHA10a34240d59349fcb85eacb7f6cb2ba40251c7cfc
SHA2568a070a2cb2f2b10d26c277927a48337b498940e518e0e5c687d176539c200d91
SHA512a64bb9d9dbef174ff62243f2dff6943055593a366c703073f5b9f4502f21796f87267573fec18998d1660cf63009e841f2ce9702ee9165e35c07fca0b0e9771e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b