Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:18
Static task
static1
Behavioral task
behavioral1
Sample
ea9241d8eb1d172f9d6474c56365b8d8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9241d8eb1d172f9d6474c56365b8d8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9241d8eb1d172f9d6474c56365b8d8_JaffaCakes118.html
-
Size
8KB
-
MD5
ea9241d8eb1d172f9d6474c56365b8d8
-
SHA1
5c8a1099407489adff908646a271bd2d27de5c91
-
SHA256
405fcdde1e665a0aab71f97d6dabf4426dbb127e5358753f9df87eb070b0f49d
-
SHA512
7ff96134ea657a889fd7c157c816a38b6f2debb348c5437b533a88a170fb44f713bf7d1f8e9ecd8259193d3b1b3cd450a1fb7202f7cb32c1babed257c9dabe31
-
SSDEEP
96:uzVs+ux7gyLLY1k9o84d12ef7CSTUrOSvwPO3ALcEZ7ru7f:csz7gyAYS/tSvwtb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05211214b0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881405" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A935C21-763E-11EF-869D-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000dc1ca633e2e805bb5318e77f89c82eb9e7b6e23fe4f0115c6440de4d2db2416e000000000e800000000200002000000007cac5a1de696ec2d98016ccce95b37e26c93e1eb694d50b338683d5086c43c4200000003711e5736bd326b158c026cef5a8a9b256d89b97be2f6fe27f7430c5b6274477400000001894b0d01de5a6a058db061549606990e1f3adc2ac061871339bfd58951c85b4944335a974d812add2e5acc2a73d5871509d79fc810201d1c043309d092b48fe iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2164 2072 iexplore.exe 30 PID 2072 wrote to memory of 2164 2072 iexplore.exe 30 PID 2072 wrote to memory of 2164 2072 iexplore.exe 30 PID 2072 wrote to memory of 2164 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9241d8eb1d172f9d6474c56365b8d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e51e799220246695e7d52b6d0e543dd6
SHA1890518d5ef866cdf7b19830bbe01420bd4b27266
SHA25628a51c3ce29f5378496053d87df17bc1890eb31019f2891d21ec2fe1f1e58928
SHA512237888dca3340aa106314a32b0b22ca88817debd4f3fa6415a1f1600c383e75d1b9e674c4dd384a2c06fbff04e3c333283513fc595fed1791358944c1e37c0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588298639fc00670ebc7ce4a1125fa43
SHA18aeaf07e6d6f0bde9e0b3fe873f53ef0a27a6e5b
SHA256c4b3580d426d577c819c83e194eab5d4208b29b810a371a7728b522b6a959d75
SHA512f28313ef111c0909dcdef09e261d596d52d2ce4933a30149a72a8096d68afb460d28329202afb4e19ef3593a0ca6d3d9ca46a65c814f5cdc99ea1d19e8e74386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aabefc66c454fbcf8e98a98d7567f0d
SHA1b83dbb61ddb97b0ed98e8cb1829a50118c78c6f0
SHA256162394573f158531baf353bc4d6d62d6760d6e1d8241a728b51247a82d45e0bb
SHA5123057da7b25acc0dea2786dec7a6e696acabe78c8582fccca8f75fccc0158489b0d52e69abfa4bff75da7a07176ee1eeba0b25ccdaffab9a26e0a8804af4b7e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb96be680303272da398495e78e7202
SHA10b56a277ed9d273c906710a07992ea55d8a16e9e
SHA25691f9a493f7d3485902a72256c4bc932ebb9f117fcc158287629ad55c29eea649
SHA5121c3561c78c9eaa816ac5119cb9820384345eadad012fdc6ccd24e5821850097ac08d8854b139c2ed9a29db1af4bc000c8bd4fb33fa64ca4aa236a58e2142e6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5f368f2f81c02d0eb2583e2ec792c0
SHA16ffc19a071b1ed453d50fcfe493453bbdef1a845
SHA25695ad8056ebee76ff82ec14aac1d4cb224a1a3f40342a3be6dd13fd10b14384e6
SHA512ecfb5cec7729d6cfade391cdba5a070b10a8ae727725ea15601424a474ae5cce51528d54e6588e75f8465deeb608c78490e432b1afd5639d6872c93247a24d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9e8078284566af4022e563166ec90b
SHA107031eddd1738282ae7fbb5b464a83b691923298
SHA2560180829eb1a7862e5ba397e2fb9c062c76c7b8d446c518cf3150cff2167be0fb
SHA512737f476f8b0ac2a630d46e4ea526c9778e4d4f00a9f8e1440f788a2c89b1682a4d2908a33126b5b87382c1696ef2ee36d4f11dfb9c2171051a6286f4f8acfef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5551d24a3f489519d4299b65d3eaafdca
SHA1622de0fa49c03b10a2ff695ace67e8588469c1d3
SHA256555550e1fcdd8a485169cd187fdf67943690545f03046bdabd8e26732d208ca6
SHA512ab454906c4a9f2c0ec91d527eccf9ad191c0125dace0c330e9db45e3cb9e3d34d6a8f2e2608e1df91f662cdfaf9ccc9c4ece041a35c61fcd1ab1a691a8d3c924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddbf043aca8a0e74454e2cb275cd4ef4
SHA1049788ed112d152da92ee5b9b4c3ebf14a1e906a
SHA256f165b1a2c7dae42e633386490e69146047ea60c01e5ff2445a9a92f3a8b33ff6
SHA512666e2da00651d265093ee600e16d275836e57e13c14c20b3ae80abc358f7304f5783b09add262706582696f7b63c21950b4d8a90ecfa90485654b2e10e8019fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f33c6849f3dc2063bf2a38f99f97e8c
SHA11a4d78ca065e7c6293ef783a1442ef73fc962bd6
SHA25653e91f4da40746255b4f1be34605dc5795c239866a210525f38c2d5da8bff30b
SHA512e2fba5bb338a288b08bad8d651b846faf5133ea2c3b3b544c38ee052d79e056a66a80af22a18cf4f26e335a9bf739aba9dc22970574f357a0fc9dd61574b54d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599702ad32c9359c9834c4a62e23aaa5f
SHA1f4c52ccab96bfa832f2f7322df90db24b07e7da6
SHA256253b98bfdfc493d5caaf4bcaeefe85941d3c3d43897d8a837bad64e1d6694a56
SHA512eb5950d5a3b7beb14b0cb780cbe9aaad0b15c3ad209ecac02ad996cb47924e399f63c860dc0ea4880b08d2cb231253b8fdba84949f0f5f5a4491d54c907cc1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0815d2b1b5196b3c8ecf17813caf94
SHA16b8494b737a5e028b51785168bbe7389c1d70143
SHA25604d396d9070739b9af13b2746cc6b2514543238d55d30a506d49a3505334262d
SHA51236d48c4c55046bfcc5c92a49864a3e1273c125303da38e66dd7362284516e08322d59dba3d84e86b17ed56a6e982f10c2c8ad49df7886b3da8ba2a118d1ec6e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf06ea10473530b3129d62a5fe0b0e2
SHA1c7562310e037cbdd28db90957472f4d17d5f177f
SHA25652f6f9aa1aa14011671477e8c66aa80f15463a9f20371fe6545d3d2a450113d0
SHA5127f84280b6e2db5a40add15fef2855b57e38938fda2befa52fff848bf4a2c669741a88e2fafd7897d57a9ef64f94e5b9cf2bce94f69670b786a0841e06d393aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f2d3cbeba0875c7d107b5ef74a8b00
SHA126dc4c0fa1b43647935b45c93f70795965b8f6e1
SHA256dafe41bff56a792978a4ee3b38ede41da41c8c5f26f3ec2d019498784c54d5d9
SHA5123ca6680310e90bac54437460c2e5865d79a6e512bf946071a806ea51f14eb5fcbaca9fbf7820b36a0682c752e9a427db71e60e343513b6e252d8b44e6aff00b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40078505455c7a05bf78063afc9ab80
SHA1712555c91622f3ed0b52e9868af2976fa9f7c3a4
SHA25630be7f7fde7143c41a401c108b6d7dc0ce127d0d5e9ac85474dd66e917fbe0f5
SHA5123de24ebee878e70e527bc736c581ec41164e66e971d27922f7820c3c02cc89fa840d043240f602b770868fcc09af49d796a90e795182057d40c6529e96b4031f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5884a91e8db452816a2ce6efeccb6f25a
SHA130bb09019d133069eaca1cf29aaad24f56437bd5
SHA2565ffb1c29280327901687690c687d43dd95fdcd19a49109cb06688406f7bc02ae
SHA5127062205b1cffe2752768c3ac958449b52e46574c4e38de2aa1590a930871030318f322eb09cea6037a676726e77731da65c96f85506686cd5e1dcb66c035bcf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5a3a14ccef88f999d62a157a3021af3
SHA1462656685df72c85df3182245e0bdb127d2d304f
SHA25672309aecadac63b916c7a32fdbd4c3c77982f9815822a4eec959d991d3cea214
SHA512949dd3f651e7aa3488c46f1b7d54bb74bf0b33d6b38b5a054f88839a6834624dfb89ec029c528ee63508b731e8fa21448c3f8313b2ccc2a84d4841a0d18d5b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a781baf3f22ea9ca2bfaad7751895be
SHA172730e38060de30c7db2fa51405ca219b59b1e52
SHA2563be2e782b486d18e0d5f463bd8f4ceff394c15a1e13ba0a1aa293d3e6762ecc0
SHA51275038c845a43b95fd883b7844fcc192f003a79d0ca578d79cf5d1f827209f3313c2321cb931ccebc42a06dcf68a50c7688a1d072db93a310338b3f2a8a62bc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c41cd0b3fee594da229c4c1c3f418c7
SHA101ebb25c0e6330ad5047e43894ed3d85b5fae437
SHA2561f87d2c329f1b6fd90156c239dbd78097263e607e350e0414a4948b677e5221f
SHA5125d53b0c256440b4ed48609d11b21968d2bd3f1581275d32c103922f09d766916718926b3234e269d94e79c710c0abb1687e3042755da6e89e27b5b48e20a5201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de655038ff11c9738266437bac3c6bec
SHA1db4375f1f2ff6f539ea59b505906100250d101b8
SHA256044b391052a1165d91f8f628e1985b702b2ed4aaff67e994ee2ec2d1aac2dad7
SHA5121daf5f96ee0256c3f77e49dfed0255f2daf76abf8a1f1bb5778205abb3adeef60298bea2630d230a04d3be80a8b49356478d5c75a5ad6373cb62c7873e2e2ccd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b