Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
ea9b9f46c4a9716c46c82291ad8adadf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9b9f46c4a9716c46c82291ad8adadf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9b9f46c4a9716c46c82291ad8adadf_JaffaCakes118.html
-
Size
1KB
-
MD5
ea9b9f46c4a9716c46c82291ad8adadf
-
SHA1
ac582a53fa0202c568a9663fd68eb990cd2f60c2
-
SHA256
08c7cd69b9cc50a0c16c96b836f2673cdac48d05d41d1b2a93475485c363019c
-
SHA512
c4c99bf6a9b452cdb6eb185df0ba5c51cf4ecd261dd475db70e686135ffe2da55b5b498fe82673822ed1a54ac5be00e6adc15cf8ffc4b075a40282f3d981bd3b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000009664d635c289683df23ea62b3e0bf42cba72b37d55b1e2808074fd34e7880d42000000000e80000000020000200000004957603990ded816d4d7300237435f6d98f386d0f27169902481a85e26b547df200000001583519ae096ad53b53f0b9f64e3670ff83c976ed52e03c840a4381adab00b0140000000784165cc17d410141eaad3dc19a1fee102f0b502225ff126dd9ce40165b5ee0c8fb10fd31b668c8ff1c90d4ef9ff3472a7c296def2bd3e186acae8c42fc42b1b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6C83A71-7641-11EF-BA16-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4008458d4e0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432882876" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2600 iexplore.exe 2600 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2388 2600 iexplore.exe 30 PID 2600 wrote to memory of 2388 2600 iexplore.exe 30 PID 2600 wrote to memory of 2388 2600 iexplore.exe 30 PID 2600 wrote to memory of 2388 2600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9b9f46c4a9716c46c82291ad8adadf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad4ae222634ad4f2ccfbce615ef3e50f
SHA109a81ff0c6c1cc5b9ad05eef0329285062dc78dc
SHA256caaa96ff1a8252592091ec6deab0e739e8c0c6e0242ab8a1e44e262797d573dd
SHA51225ebc2bfa68ad5c150d1f89f5371d38b0cc7ad48eca7c7d8c237b32cdc17a07def048830fa7b90f7ccfebd77d19804433410ffa54aa9de59a93cbb95e9117507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4c94668ad94d1d98b925140648ac53
SHA17a228a102346b8f8cf47cd2cb4d2ceb485e69b87
SHA256938cdd48cdf10c81bde64bb4b6f846edf92180d07cdef9238e55d3b37163e8a8
SHA512129345fb5a940106f2c76fe42ed89d46423506e404aaec8af1b7d9fbab105200a16d2882616d5feb3aaa1f98ae45743a96878459a28bf538dae6de7db52f7891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f2bb298296cc8d1dfcef728f014f8b
SHA15ba2bfc1f3aa081bb59cd665d94e28ee6e929945
SHA2567bbae690c1ed16fd91938cbccefce41c16638e4471ffea67a752b1c162239c5b
SHA5129badbe04c15ebf1b84b4c2c2b71b289561f08ef7dc7f8e4468500dce90b0dacc504f62e2c0f465a2ca418f32e0cc923650f22f0f58ab452d090ddc4073806747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589dab4f6f198444313af31f56231db32
SHA16dcd736eecfc6fd25846bbe0b238e46e9d74f459
SHA256592c1e327f2a9f4f18a3dbe75bcb8ada11e8926d41913916d9008266d0b72333
SHA5123e70696bc802e7e365fe6762259b7fc6acef9f7b5620521e2710ae493437e00634d0614d06fc89d82ba1e0899fc9b5354bdc29b957e3774d07e3119b9c669b54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5db154a18f3f07887f6c72be777fafa
SHA1a9076dbd8a991240441acab4b3df4835ab2e649a
SHA256dd750f89e3cdd81d552943c92c1a717e7de54c497829bfe9cb0e5b7e69d26ae1
SHA5120dbc3842add6d4efa19bfd9ecb509b6e14144fb28da50db6576a28e797291fa3c5c2137a208d917ad9063efeb796a135de214bed00502b115983fbbc80355b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad5e0f9008c91ac35dbef8cef58e654
SHA14122ba273b7c6c5d306eed771c24c89d4bd1ba7c
SHA256c9e22bc1c38d9566fd09faf8541087205fdc9c9d0a22631653f9f61871f5a48d
SHA5128c200168aed6e8e48e9e0d9148be0419fd78ca4668882c609b0df46793cc9372281d20c3c17b644271abc56fe28d452d27c3e686442f848b7ad900e50d3a0915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1082d1174fc07552afec2ef88888001
SHA14d5c9f225b5a0e6f761bc08ccc6bda6a096fbb08
SHA2561fd3d0518c4182ce642324dd23090ab46931798da2071d4c444d32e7f49690ae
SHA512f49794bb8404870328547d09ef9d07c2406903e17a6ca2b304b8b520f04434c88a647cde7701b81951292f99b7b8cd44be3abd412584c9634730fdb6f25f2977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f66bae6692344ef70f729835d2fb7fa
SHA1f63afc2615d7961b629a1b70d41e3187889fe6ef
SHA256af0c31cbfa525174b2cae125476fef67e3cab8fee2c7e4e43c1004a6f82665d4
SHA512f41d3f0bd9934364891158da7fa29de4158e5a2acf7d308ecd695118528a9e8f8150c62508454ce4c601c97c420c2f36f31a30607113138935aa026472baa8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d105cb6dada51abe2a23bf6c0e84bd27
SHA14270fb76a76b1c717f2c59a27911ef2517ced1e3
SHA256875cec232ea138208e4517f714873b2d005987424bdbd0c088eb7fabc75140c1
SHA512c96c421552b1715dc15fd8f2178873ded94eeccda62c4be52aeca936543d176a7f7112f7a72ad0ca1f48b25ad423c861e64d6583fae816d281b330c4d06e703b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfac915b6b3c0f25bf1f3ee593b1fa8
SHA1c75411c9145cbf38eaf3cd2f82bac0db3f3ed8db
SHA25626305017ab7889c828011696c763a072cfd89da0b6c36e0afd8d84bc0365ca96
SHA51228e9e3c933bd92ddd9822f41c36ab5f6f34b39c6ed7f6a7e33368dfff86dcf1bea22cdbb54e7d53e6b4f9ddc24eefcbb09e76e3e0683376282256a8ce1a5349e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db0228a923f1b6c84ee74312e408685
SHA1f6f715664ebf88fff2553da3d8ed4199e9421e78
SHA256684ac345e38c2d32feec36ca7b955f8354c94d149362627d2d57d629978b8dec
SHA5128c04cce47b6e8e026e400f47bbb07a6df3a0934fa2197438418eaf0e8a59c1a47e928d6282a9adeff6af6a8bc9156964d559a86e2f8f222cd2d3fcd7f175efe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b2231d1f0c7a44b915397cc426fe850
SHA17929be0142a4a5e9a8f21d07dae344fe1139b33d
SHA2560522905cff657edf7c7a1efbdc35a7938139e6374f10450c98c0157bd22fce8b
SHA512096c29deeaee791d84ec9941c328a54fd8771a87d9e1ece85a42df7a09a6f040e9b3c7bdc3ffaf15d1412f90273ec0acb45a85f6eac6016c7139c62814263f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf3e7334b51a97b8295da82b69b3960
SHA186e12370b495211e260d4cdc1127480b65909184
SHA256c7afda7b8f1b351b74379f7fe1476c298618e9b9b0a0ac6fda561f76da99bbaf
SHA5127aeb6b25db5618c1bb95d7fa81309556cb870f9511839f0863d4bf045d50ba08a8c65af8d56ee75e85e298dfc2857929e3fe236fda4cfff4d44193c77fe5c440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b7d516b09b9224ac7c6027be586aa3
SHA153a534bf1799d78d5f7693362bada9e395208e6c
SHA256631342c20f253853133a3d43959874bad71db11fffae85c7422add021360410a
SHA5120d0af0629bab4485ed5cf7a43689c860f3d89acefb0333f07a3cfb87a1a29e3d1fbac6c5db9b5f544acdd75362685c9de0b69868825390b04527a3b5b99ab057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7afe871a1caf8e8ee47641c17d0cc2b
SHA1195e607183564253f102e7b04a77dfe417786ff0
SHA256037517a61f80bdfddff8def7223e4d5e754c8d029c4ed0e27b949574d9a7648b
SHA512b8fb6bfdc977d1d24085abf5fa00da114a5d514106456b56c89cc055287c79a347127bb4956aa95de9cecba3ada80a6e261cf2405faa5167cdd21261bfb54343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4dbe09fdb30e6e342912c1affe65b6
SHA10bd007f700ac9c09676b937bfc89714a940d4777
SHA2566b1d570c618034bb786c4effdc614d279141aa7633d759b9f7db8a0eb89b71bc
SHA512c8bfd0ee445501ea3317e2ebb8c9cca61031ab5981a594c7b099cdec15230d4abc3d8530495f89e7ec360252c9a7369dff260ffcd5814477a8fbec9d45eb183e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04c961e608366d29db6a3fdfa872c04
SHA140683eb59861113cf92be77b0f8d42d9909d137a
SHA256307eb3b5d5392bb96c22f5f4a3eab10d5180ac3779208f30af1187d95a65ded1
SHA512a2bbf0bcb4472c31b99321651759ce26fc8eacde4d7df06c20c0d53bb3a4ed776b70a8202dd11be495ea02744d337b9a12e4223e063e9b39065dae7b2338610c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f665d25447b5cd61a6a1526ab3b75dc
SHA1d1823454153ce0e58a6557cc7eeb103b2126afdf
SHA2567d2fed0326cf1f7d76e0d0bf84c49b042e69eb47d688d882eabdd0e6c8db73f9
SHA5127f4bba63e7f9b398637528a4c24cc40ff4db93b5f918203a64f5746ea9cc2b393d3f5aa1ad7970c07f4b6e235b3c461812da227d6b699e2740ca9612d0f24296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec130d3fb778f4377eb298765f3ce6b3
SHA18c0a453da945454ad320d0f39f489ffbc434b89f
SHA256d19a008f75539c26100a83252b66998ec0f73629203af78342cb4c48b2a0c220
SHA5121449d0994b4a20ab9471a44e50e1bcfa350304a5f969cddd5e88c2e302acc083d993304531652c61942f04631273e62a433debed47741268577499225724c8a7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b