Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
ea90e6d9e604925846ee8c3f6bf4da71_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea90e6d9e604925846ee8c3f6bf4da71_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea90e6d9e604925846ee8c3f6bf4da71_JaffaCakes118.html
-
Size
8KB
-
MD5
ea90e6d9e604925846ee8c3f6bf4da71
-
SHA1
ce19a47ddd7116b10ccfd6533a3c807254af2bb1
-
SHA256
996b2e7b79528c75d637eb4f893de4380060861363c8e7471c2918a63b012dbc
-
SHA512
f4012c07ed840a63de2f84f082d21495bb913e76a1d76ffabc50a6331d38b59690db043eae25af965e2e0465dd1f7cfac1a93b3fabe62c8a8106706461cf1666
-
SSDEEP
192:v7YPFZdBMe0/eq07HjjKM8t7tRHtKq2bwwP/:vUP3d50/ez7HjjKM8d30wq/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000007341e9e89ff6c50b56d0304f5eeab669d5774a048d43f51521844b98c7af8e56000000000e8000000002000020000000a15a7030c0f3ae409f296151edc502a8b4e4210cfdc4179cdefdbf920dde45f92000000087e40fb21a0505536970106a75f01954297bdab85631f9ce5f8e511456fc02444000000035079f5569b58dc602a2559fb9eb87fe0ccefc69b49015656d2d3a59636977813b58fb0657f87fa9e57f23a9092ec12d46d5609eb8ee38c4cb7066a98530483d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E96FEDA1-763D-11EF-969B-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f9d9c04a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881242" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1812 iexplore.exe 1812 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2704 1812 iexplore.exe 30 PID 1812 wrote to memory of 2704 1812 iexplore.exe 30 PID 1812 wrote to memory of 2704 1812 iexplore.exe 30 PID 1812 wrote to memory of 2704 1812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea90e6d9e604925846ee8c3f6bf4da71_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e707dcd3ff586931655840a40e166fc
SHA1582d8100da7fdbc5bf1cf8379c0e537daaf944d1
SHA256726b3d113beb1ea9f3da5e1f3e54c39e19abc19b50dabda202945901d569680f
SHA512688115719a2306ec615f0ccf93cfaa946163f89d9cd82f679bd6a445008b703d58c6950c52ead820f750de535c7cf6ec7ef80ce1aa1e44dfb8e41fa12104a364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db74b460ce8f0258e730c8216404903d
SHA1fe320a26c4063726139db737d95ea620c9be75c6
SHA256dcffa62a2ced615ef53a61cd28382d8c451d3dafb901de95e665dd765307e99d
SHA512fcb019498cb3028eafebcb4916be90fb8d532acd6173ed63f4707f8df05a5f19227975a85d588ad276110e542014058003f287b4a793c0ff752668f2a8e2e468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a5706a087c4b09551583e768a05a0a
SHA1484e1433c29ca1dac28ff5affae697cef34731d9
SHA256bc0f0123e8de7617cda9638ed4fd1afdefed3eb09403e2054100262e931696fa
SHA51258a308d7823f5edb121cf6d647efd73fbf08addedea4d929dd1773b47b239ec1e64605ec2448bd5dd594ff253375d11262efa156132802684a06979bd540765d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf580df364f9bb34ff9eb790e297fe0
SHA1813861f751b9b727572ca795eac53e0c8b392358
SHA256e3156c04b5cff5278c776081173c3d55de91b08af1c04fd07ec63311678d983c
SHA5126bf1413c7c01db28b3ebdeaf0c593d413641560c006c9a5c410f7c5abd8d28261b894000db926e62bb3cbca3ab3559467095854a75483ca41249c4e73e489c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51711041cee042aa2da68be7d1d0d8b30
SHA139437195dac8cfb53a463ced42f301aa2b589eb2
SHA2567eaea163af36d4a472466d0041220245bdc34b334220a54506ee756c5d7be918
SHA5128ca48d050c7aa9e988aa77e0f56a3f874b3b84dac9bde5d48fa74d445f6aeb0ad110b9032b3c7b01eee14e94c24c729d363147342dfc4f991d6c0478d4dac28d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a712a3d03adfc91c920678331d2a42
SHA114240166f73e5dd854c23cf3bcdf2287e2826962
SHA2562379ec07fe6c46a12d39d8568af636ea01743c29999903a6a7e5a97d4b9f40f8
SHA5125581170c43b9309f7490d3c9f6d5f8ac2607f00965d8c0bfc93b1625e796c8eef718f6a42d14d76b7ec7ff1db2cf2c49df23ca3078c6d20d697259fcced00b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59754b6f1040a425bd0603a9dc61bf5c2
SHA13ea83e4fe8cd6ca8294357bef65fea7b4873ac9a
SHA256e0c0b9050737457d4ec6add5d4d400c2b4c79938a8236269db74d9eb96a34079
SHA512daae0f36ca3ad6e44607cce36dbc74f65e2685e6e5bd369055e09d80d18e11c7d2553c44f3115ec1d6724f5d2b29c8d28b0487984692986af26b884743f0c2a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee151778815098ecc825b6b2aec166b3
SHA112dfbde7805b4a38214974eded4eecbc90b8764e
SHA256888d4ecaeebcd1f3282547b43c3a1fa6447985de4af943f47e89ae18ca41644f
SHA512e7a34241b570a6ece2fa345b63a86129effe18b11cd0848722bd29fc83c85cd314253207b35182833d3ef20b0199063136c5cf0a6002356b82797f79c19ac7d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b45ef694662cf77e745645347413ecf3
SHA1ba7d9c679ab8de2441882ff0753270952f5133bc
SHA256226101f1c886fff486e0ba406e52ec16c50abfc2163beec62adb50a95641381e
SHA512ed707e87d1accbe6aff21cb53bd1de9bcf611abff03e27b9d2e4a96c6d5afa991548b9a940adbc79aaac42dd550873a43f426a7f6c40a33e4f49baab39185d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e384ae6c4651afa43889e3394686bd4
SHA17ec57848eb3f62aa4b4471e974f8765eb6be9c40
SHA256e4791c78ecf34c07d53bbe32dc7bdfdd8a068418e6491e9259ee405681f01c27
SHA5124b8069b827b81262e813bfa31026eb712a9931dbb95268a7b1e608bfb9a9fb0a8d606f324198861f13c26968f5b1e8c883f308c4df375f640257019e50e4982b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00da4413e5b2c6ebe361098b4f02f5b
SHA1ec87521f5a7e29dc9ef1e9c9af620213c8e509c8
SHA2562e65d37d14c3e12d93981dc7907908f0afeb37db41417f262eb97604307cabbd
SHA51264f5994b5c2d73411e28c9813c54b2f306c64a807d1ce40a8bb17a97f6d800665bdc945529528477823c5f6847fe4cd7add330334cd425ac100e05ad8a15b736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52246c30d3e0c005c3282b2aa65a5238d
SHA1b5e2be5dbcee175737c90048324e3d180d816854
SHA25645f4e1aa6411e15228adcf44ca96094ada91128b414fcb139dee3112debd6b17
SHA5125cc4ca046f00a7c01499733d85d30e77a99215e08d1e9c2cd94d927ffe742ce1206ea68ed28a96c6971e93c018d9b1d677e1014d7b5e6c720fbe76af698eff45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcb2dffb7a1935ce297bd404857ce4d
SHA178c1cd4655ea55cf99fcbb23eed86ba898bd255a
SHA256120aa265bd3fe5c5aa3585a5d211c754566e869f8dc5e9290a5c43503cf3ef97
SHA512b11fa1af1bc73c7aa1c3df798a6df6b8583a1ef7db37a226fbaf8b3972c44a2c5a37fabc87a31f3e3f1aa2d2315096cc356255a0c40e08190459e684005003a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a541e5a46bae689502f8ead49396f78
SHA14bb5ca006c2616dbea11db7dedec97cecaaec5d0
SHA256e242250bf27f5e7b67fbff8c5e347f0cdc0de5ce8d99d56100b78795e0ea7445
SHA5124f39795e4dc28851e38b9752cf4bb2d297398d21fd6a7458fa811840e5e995345dc726f4b4db1dd11cac2c30cabd94e322286f7a2b5f8b106bd954a6bad420a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542243f2e76fb7c8ce9bed2aac6bd5a14
SHA14844d1a824b936f6ebb79fde00465fa87173415d
SHA256d716998338cc126a18f340ea94c2ae5da7391d8d9b9b38075dc4249dbbc9c81b
SHA512f3de0e16d399b6d4ec5831523ddc16a33530985a68b8f52781b0221dad6f6e42f1a33c5ac7a7bd60cdd40209b8998e61b9e1bc17b8492a938f7149b6a4ebb53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59deebcf64a441b91e9897d1e5ea9fabe
SHA14a26788e2311d6171aaa58812076aeeef9f7982c
SHA256df4b5a01aa9bfbf3c0d840ec97b0c899dcfdaedf743d67ef48c2589159c24b94
SHA5121c1da67e1d5a3297ac56c8c7454de680f8c0e522868958fd745fb59869b6366d33e0b547aec1bff7e538123a7d2fef2c6773fb65a8057dd889ed43125a298c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5debef0b02a9a130dbee3b54ecdf5c673
SHA1e1c36ec0710ed7de88210a0d33bdf1bb61ff9c07
SHA25687b099df7984002b0aed65bd5888b44df3d24ee31cceb6fdbc49c0051e4e214a
SHA51225972dff1e74849faf2ee2423b571dbacf377d7a2097bc7b3486f071722cc77691e9c297f8417bf8d7f35c2e5027aab00294a07d10003144cf710cd38bbcbbe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ff99421c55e8a8ace249847009568d
SHA1afc5212b3d34d0a93a12aa96c096f948d7544708
SHA2565dc8a34996f293919e65530700c0ebbd823ad3504f237e18bf11cc22c00ba7ce
SHA512c2227edfe38b1cb808bcf35fc42c4781ec2b7a47d717bd3be9ba883d294928d2debfbd09175308d3622e02d2679c16f522c3e9383632e15a1a180343db81f528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc70be18df4550b31e243b8f4cecd40
SHA1be8ab4bfd03169b27dbabbde40278aa99a3d4447
SHA256f675219aea85cc178f826c8ddcc2270a07cc04601b751f42a128309dece5ba89
SHA512e12281b6e8432e9d8d1b4f3c813ac5bd0d88cf44fca06e69fd17d80478d9b27b702219896e040d50f5a06cabf8587a0f5d6c1469a4743305752d977152defbda
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b