Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
ea917739a492e624e2bf7794813def5f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea917739a492e624e2bf7794813def5f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea917739a492e624e2bf7794813def5f_JaffaCakes118.html
-
Size
67KB
-
MD5
ea917739a492e624e2bf7794813def5f
-
SHA1
104b76c35f8ab447a40dee36b7f3e2c089f721fb
-
SHA256
333e45882e3f1a54313799366c5088ffcb8ebbac54f301f25d47950a83a927aa
-
SHA512
781c91629a7cb702a405b9d964b68976a43dcb1b016f8842e937fdf655f8b75d46bd1355bdd319e37aea29c43ac8976c551c8bfca26279d1df244badf2f72016
-
SSDEEP
768:mgOriWNcaSoagGzR2Oqs1YwFja8wQvZqfX2soA/VIJWgzbrZxL31pDwNg51yv9uY:R/lR2yFja8hqfmjJznLMgU9/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40586ae94a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000087e535b55c376ee476da7f2ab0634eb13ab556c57a80a7535412e264f415b7c6000000000e800000000200002000000041f09c0c47bc9b46cad2c5e6b1591f3d4c74e037fcf89b6ccf45e1fc40f9bd28200000006265d16632a28efb953ece3c9503ed1100ca5c14139157d1ccfe2bf2c8129bcc4000000068fa524648738f93623c6356da3ca88b71ff6591115e4479a63664f254ee34b02396882df9b5376c5deaefa6535c79ed26f6efd0b84e923c163d0cc0826156fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881311" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11FCC1D1-763E-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28 PID 2240 wrote to memory of 2524 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea917739a492e624e2bf7794813def5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5ba9164eb7fff24bb8b02834a1ebe84ab
SHA1d96530a6510fbf8da500a0b5edb4fa5366931460
SHA25623aaaaf54e62dddcca4a36855a83dc28a070c814f87e251ae0b68e36f1a555c1
SHA512ecbce18b9d029f6595165bbc1825c2709e689bc96e73a8fe2d20bcdf85813259ac138737679f17c3df67b8f155106c5c0655c0ed7daeb12030081c133cae2096
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_F968CA97A68F4E6D5C104EC7FE3DFDEA
Filesize471B
MD5a8b199d725e204fa9db45cf198e23b91
SHA1cfdb28ca6c3d4bf5873016fdc265d4d54ddbd086
SHA256f1eddef6988eb7ef72df5c71df7e57aaf2e9097a8db30479c97c0417cde415e2
SHA512b6edffbb3b072034f804845e9c373ade96b8ec6c42ac9ef819c68dbd2840f2a8728dda9710c98d56a4b59f9736342c46edcf1c646525bee6eb400a545d8224ec
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5385c5ebd816e7b5d5885e7460ebf32ed
SHA1a8130cf58ec395370307bfd059b7213a8d39a8fd
SHA2560b01872c41774071e97b5b755f213c7dbda4aa72159324b3d080bf175f9a42fb
SHA51205bc0500f68586d53827d5d240b575cbd17fdea0b0b1769f48b778ae43aa4be5258b5b503369e39947db5769a4accfc0eba340321177fd6e13f184ca7188a72b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD52d56591ee5bbdab8a1956e0d1be76f8c
SHA1f4d3a9d6188b60ca69813a85c4061444d7e6bfa2
SHA2564531b5ab1abe0c034cbd7258681c014832950716f7b8fc66233b5e0df7faf554
SHA512f8577ebca7b8c9400750eef1e789096e90def80c26f56ad3ae6be3510e896479c2876a90671bdc430ae53f7127f9da7bdd20fd4fe12f818d4541f319210eec70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52326f428ff3126cc557aaa9042cafd8d
SHA18959d8dca32cd928538601c9ed04071ef33b9349
SHA256cd38757259c0c965898d37e477ae209312bd17a2c234afe518e6157d70fe6d20
SHA51240acf0654a277a7452ff68f5e6915ed79c825f535ef8ae608298054f687a4a6e3d7a2fbbe9ddc20187acddc15114d5608b569a46c6147bea75be5aeec3c38d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531acb1661654a7c4f6192ae3eb7fc345
SHA1a745f5baffa2eccb35baea8f2f1ab9f3f6589f7c
SHA2560332a6c072aad6eba32fd761467e7c2fc1416dff428438e05e5fa043369cf49a
SHA512509db622d9e4915b33ad0c45ec1d0e97e2ac5faa216096801d3abcc610f029e88fb0b1417db78c672ce99aefae9e3c57bb2d2cae259ab592f13a70360589c103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfd763a8b4e16b3d6bb7cfcb23c99a89
SHA169e0ff93f00361ab6958425d07b9bfa047af8a3f
SHA2567a24af907d5bb43add304ec4aee627131af038efc50bd60eaafd4971ef13bc51
SHA5123c440576d83a5db14c87785ffcb59522ffd4f889cf7f883e10f91eef71015829ec8abca80b894683950c18335c943cf37a0f1ee76970c7744a94a82a71fa2e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2c2bc007305e9a253320425732322b
SHA111999b3a768dc1c1c132489fe179071e0d54ccfa
SHA2562de8b200c98c8aa6f4431c597b7b7ce34004295e4aee022ae72f7016401f5d3f
SHA512c275a46f736a125e975b34671995fefc337d3a2b1b2cb46f9103ce925e2078a26179c86317b3221c3a4c8e738d08b48042d09343408589428e4ec71bef6f209f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6add4512fa608e4d4b5033cdfcd3963
SHA1be68cbd4db76ae6b8a64e992f3192c89507710b2
SHA256e11b54aaf000d5cfbb4568e86f3cd11e03b03950cad17fc697dc70a08ddb6e14
SHA512c792b09c864ac7dd9e324bd428dd26cd73b9021915d42c0a01c439141cd533ed5b70a6d053401d022eef01adf1abdd25dfa6f08330248ebf611b7eac7dbbf0f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517816913319027ab6ef520cb73e66bb0
SHA18cee2b935fb14ed9b1460ac0900f1ef8c352fef0
SHA256a2c6a052cdbba912861fb843a3109899f687bc12ff1b70594db27fd57109a5c2
SHA51280403ca90f5791b117d8638fb518821409cfc23abd9123658ea01ec2a7f1d60c06b049974f54c59534ae6dcf87eca2ee7f2d05ab8f545199e91d61182b8d249a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e76bee2518c6661b7ecb9f48f37b8da
SHA13a273a71fe5c3f489e42042bbba00eca26e4a6c3
SHA256675d0706064a475e56f9e70be63b14823412a0893319b214bae037f821d258ad
SHA51215f37c2b007b54e446add0a14e575065feae4e1aa13f8553e453c95607e8b721cec190a090e67b1197fde6f1d01b2e87df725e40e396bec171c459302ce1e61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b55e282af1e8f85dc4094da30151ef5
SHA193bc2278d65db289755f4ecff9316a06709f7436
SHA25652beecca6664fec96b0a5a698f91948d5eb673763b213c6f102422d52ba3ddfe
SHA5125e139eed7e2e39db8651d18e0eba7d2c92c7110f26ed709fec0443cb90876a8ae200ed8e3dc993fc98f892459757fa185c7e176442e5357d6560476fd4045975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5af9f7ea1e85a03e65b04b3161ed5c4
SHA1f4e7d55612052ffabe2ef190a6de98c5a99ab591
SHA25672f3b52cc9d8f504f18a972818d502a0378e33276d6b097e13f116abe6340efd
SHA5121805934300a814c418c4e3fbeec42fb6ac5cd73e1ee20c898d7f525fb46d51a17ef12b8c1a18358ad52b7f9043e75c8230ff4fad6f9a318fdca6dd14662fb269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b36cbb185e4363eccebd99cf5c199d0
SHA17e519e672e3c58fcc071f05761a8688b319f9f38
SHA2569cdf1dea31b38dcfb7cb1c0c76dd4b0fff4a6b0a77439ec069e0b149c938dbf0
SHA5121105e30ab9bdccd54bd99c88957aa8d35443d07e858bded183cb3fae5d1c6d98f1b4e01883ed80d8abe704a065693fcf51deceb0cc6d2a318aa4f8856f1f6f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_F968CA97A68F4E6D5C104EC7FE3DFDEA
Filesize402B
MD51b31b83108f18b1154b3ed5f49e1b1e1
SHA1cfaab9582f4708932d99bb41c4b56a81b1aaee98
SHA256e573106b4b5ae286be45f7cddc25b5bd2d972e262d7d9f92d1c340c209ac88f7
SHA5120d5dde3c65a2824778c6c7c1700ff3464fe8f0bf945dbaf612cda2ed1f56e9c3045649449aee1a586b293f229b519b186becd64daa0113cbe87d8a3dacad3058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD544d031b0c27bae619f3f4bd7b273348d
SHA1b26b3cdef3e131a5e9a53b647d1bf76505f1f45c
SHA2568ca098ea1361bba0c2f8a21479200c437806ba7f236cb9df2856ba38c4abc431
SHA512b22a36c264c9f4dc484d6b48b54710d0d61f0465553799b664ee408174fbf04614c690ad63e2b31bcd22ce2b87c0ed790c1560b93ff7346eb1f5a3b37c58b103
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b