Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
ea9265df86ac0db536fe546b8f260c96_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea9265df86ac0db536fe546b8f260c96_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9265df86ac0db536fe546b8f260c96_JaffaCakes118.html
-
Size
916B
-
MD5
ea9265df86ac0db536fe546b8f260c96
-
SHA1
43b4127ed1791aef528f10610bce1f06530cb209
-
SHA256
9ea1a19c917cd416ad78b56dae32551a2b1953da21b6d483ab3b986a854bb0e0
-
SHA512
a34a81f157cf545d3f27fe0d438bd858d0e8277374df4519c78aba7e7ca1f2303af97568b2ab4dccf7f481f24a10321975eaef931a080a9ef258cbc7f837f254
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f72d1f7e5b06200fe0d9bbdd08e6d493ffc95cc7a897fb33a1f054d164255cdc000000000e800000000200002000000079b936fa8eb50b1cfa4d2d56bbbcb18d2a06774075e63bd2f543d6259c18165620000000a66171145854c3299938114b6b661ca9d081c1d65fea9114c18240b94a09a8924000000082f0ca703ac97f0c6303860c28fa8d3ed4352e9ca21e274df2d0ddc4a1c24cfbb58e4b5d691df6785d1b6c8ef3ce954ebb0a454cd0b027ae6146cc7a951fc286 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d124194b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432881422" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5417F1C1-763E-11EF-9747-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3032 2396 iexplore.exe 30 PID 2396 wrote to memory of 3032 2396 iexplore.exe 30 PID 2396 wrote to memory of 3032 2396 iexplore.exe 30 PID 2396 wrote to memory of 3032 2396 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9265df86ac0db536fe546b8f260c96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5dafd014af7e4c9bcc3b967983d4c0
SHA1c93fe6a7f63909ddfdb96cf8a35db55bea6e6bd0
SHA256f911ea81dd4a76206e82b4c6ae9dd0ea731f9a94e31cc6c535ce5e64f2a40465
SHA5128a19c38516df65b220095323343a4c457406d39b1d5973e354c3a7a994e53aee600d2a9e8ee60f11dda7b76337c1493213bef3d87a36c6a28245b35fa5211416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d122150c471cb4141180910d01087883
SHA1208d1eb03f352dd65899d92e0ee452115d64565d
SHA256908c5293c652b2efc70e091348e007031dcf534becea39584149aedb011f02c9
SHA512d9ce2528e4b62b5c707e5905fe8601a78763af8490a16b54f6ab20585634cf2b28530eb2da54d649726a4cd8eb570491972ab10c99766072407603d962926c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59591e27c733ed865e13b402ed38373eb
SHA142a62d6b8122959e9ee84728f756c30902e067aa
SHA2569e468a18cebae5f381f40e85ae74b8d1ec0c8219e9b6349ec574a8d1971f125a
SHA512bcf0b639b372a00aae5d799358849f6e7c7f50b78968b6163f48a087ea974a4fc0c21bfeab73901248cdfe951857bca4efdae525dcac8ee0ed45ef7fed2b93ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def53629337f543a239ebef9a90ce97e
SHA1889523c28ae6a668d348efc6e7b65c5dfc65611c
SHA256f430a61dbd3efa0affdbfc48b663a9ddf7f6626e25bca2fb9c1285da07c5abf2
SHA51287b3a4d5ce9b2ac8da97ef1e39db510b330e4a3bbfc8196c1952914ec9167b1bbd67da4cd1392861a2ee7a1d31e7ef1c8ef13f9c75be02bf0ab69f731864db5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a5f8d929c3839b61c6c08986469f0aa
SHA107db215620c112b925c0f7b824ba845457082669
SHA256eb0d4d585f00f47496028fe0f342f06bf92422577cd902c1962792134fdcc760
SHA5123558a281eaeffa7f3a5d3c0799b4ac82901df78388a8b33f4802230ef2e05134a71048c964d3707cc778231949e70780b6a6888027525a33c4f124dc6e2634d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50021eff046f16587a9bf3a76e89b17a6
SHA17e7d8317fbf3d740ed3c364ec9e38604dc9e2672
SHA25690b6052bb5d7ff8874b7deb70654307a46888b04eacf4cbc0e2b520dc23f5e55
SHA512558f249ff38be1b24018d53b38a4fe884e832823de3d60e96eddcb06ac8fb5f5948782bac4e9082c781ffdd3be531fc34e76e7817584fb2cc3a15fef97168f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ec869e4c62670e983dcecbd45fd49b0
SHA16f4f0bf504b6d5c7b7a045d0caf540a225a4c803
SHA256ea580745dc6199a18417990764a251d5b4d02ebd1ed52c78b3873a7e11b273bb
SHA512364e69cf30f6ba192cc22a6106fdb83ba3c092906bd2d7d086e566307ffd178458ffaf4d1bb3111a41337d1120f51d6e87aaba4c5d43b7ffa7c51de6ab64c6ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12be65832262078dccdb739be479326
SHA181e06b9013777a207d06bbe6824df68d39fb369c
SHA256e8deb13dae65d5da90127df0d0b647977b4ef2d62637a3572f93b1ae69e83dda
SHA5122b903b6e0243bec590b3321073b53cc71346c75a0526125d1c251f55bcfd04e8f5ac1e23304912a8ab89a1d702301576f303bece92f04804a627a95ead54f3f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee88887134936b645f0af2f5b480bcf9
SHA1274c9ac2a8019415f19cbc746add40de9ebeea1b
SHA2567b6d75f67b6182b900a6616f77f99ade904e599e86ed41da29637cc0e2ba93d5
SHA5122786e271b4cf4c8d8d25b0ced01ab2cf8870e19f843d1f15514be237ccfcdf637f63371ded399580808ea5f4fb1dc0024e8cf3def942c7a17d1cf49dbbe65039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db81e453a34bc0c641fe9ae2ee43b25f
SHA1daa366e41776b64bece5d44849fc546a17926874
SHA256188bde1854f281cfe4c5d1bc6697efcfb0ccee25476fe10e090e4b8c1e9619ce
SHA512d1e40a21b2be24070c9cf87ef11b0c8716eaa038df72ff801d8adc8121769e90ced1107787fd61291daabfa574a4a495968a340b9484ee074a814939924f448c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff4638caf80db94798c2bc52c5b157c3
SHA1e1e1f7bdf77d48ef4b1c0a6b77db70517ee45fda
SHA256ed3c0cbb48acee7f3490fe318837c3e7748db9206d06b097a7cb6cc7ae1aed98
SHA512ed6058c36e435209195666388976893033d5c48551eb710644f94e2040bdccdcdd8835713f9a99667d9ee7b250dbb423374e624c0ddd84bb02b751b62d6038f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58204698b9564cea30d6b33e7b49c44a0
SHA101985f26eefbcaa6d2973d8c14b70f8bd4023499
SHA256c039a0c45b05ecf6dec291ae3fc0d6b235373fae80b49a70da7081eb79c4939f
SHA5128f7b4f00e6fc162e1de697723b50c836dc68cc324a4a4289b180350af7f43785faf8af7acc44333fe8d5e76c11e7290fee7816e3f30e2799ad2b8718e4c3509d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56824fa05556f15b4d3e059acd25d10fe
SHA1d4fe5eeb60a4a476f2cc91095535e6ce448dfed4
SHA256b65028b215a03bf7ca690a721ab7dbc9010625e882734d70da6ecc5054450617
SHA512ff64929041da5474025cd3533a530ea559e3e708e807ba11267554f0f721321a937d2fb308ee2d08e19b21c6c19f6c109eb09891829c5098def52b0cc757da79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a608d12cee33603283706cdb21445ff0
SHA1e25eb1f17dd5e5d91b017842ab5cc2b6a61ef993
SHA25636f8531728f5d34111d4738268afd0270ceca1ba77545ca0de8bf16a764d7e33
SHA51275edd6ff6492cb5cf48a946bd28f1a714917c31ebdb63c4f34f711fcfa5bb80f9025f55fccb3d52ab259b6595ac236036bd74c95341c67f9621fb6b2af15a5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba03f4f41c97e99b3bb340dc0e0a87b
SHA151fa0bb139168f91ec38d40a1f31780e5e299dac
SHA256b1980b4c24a7ce9ed2f134ecfd3251b65ff235aa855319d4a2657fbe526d414f
SHA512de093126351118445efed0518e765d9870b512c32f75dfb9fe7eef7932f2a70a44ae2f954a209296543ada41be7796e9393089efaa121c9e8e9b922de595d6a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4a2971ca6b9509497b9aa84721eb27
SHA182949a4f2f03e8d98479dc209469d71732665396
SHA256f3a9d29917c912afd0009aeb527b8bafa3937c9c42d59ea4f62cf3bdbbc6e952
SHA5125a984baf9d2c816a0fa7065780890a10fcff7dd16b1eeec52304ce11284b66591094845fb8bace2e7b4cbb4cfff2427fbb1175bf912bfc279e52b02452713768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e767f3e55bc68af975e33afc8972d753
SHA1aac8bcc9811cfc7e3c54c6b557ba5b93f8009ff0
SHA256c67b5b33617ce708a85d91806fbe5f82747a43d8af5be5139ca14c5007f60588
SHA512773ec18b0e3025795fda66e87f6886dff20b08d31a4015480e3fca7beadab4e3ffd2f0c2d42fef18f57eb584315d540a0e989b2ba860cfac7305f4532d766455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561751de65e045ab769453749353680ea
SHA1628d22c1bcffee05a1e824df936122ac641b387e
SHA2563f8551dbcfd57a9aaac438c49907e8c2c489d6d44a9aa86415101e420aec767b
SHA5120af44af04972df296ffcae621a2d4816f1e3e37b146e6bea6154ca888e3bb551d60b90799ee3900519cfaa4ba4c1ee5ef9da486614011aa53eb0bd1720b27aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e5878796c19080d3a69568734bd58e
SHA1fd46c57838312ab863e747a49ed4ddc28bd67cf6
SHA256d7d9b750561788de500fb497df1a233348016167a34ea4b4fd45f07105250836
SHA512bd3aad2cfb0842b6bc10a406fdd30e42fc46bc1842bedbc5edd6150b0d0b7995d0d8c6f7ebe7b8f63f38464d931084d9064355b814daf73fb6d16d824f9c8a2a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b