Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
ea9cb0f981af8e2af0ee09d770a70a73_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9cb0f981af8e2af0ee09d770a70a73_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9cb0f981af8e2af0ee09d770a70a73_JaffaCakes118.html
-
Size
67KB
-
MD5
ea9cb0f981af8e2af0ee09d770a70a73
-
SHA1
a192a7899d6b49280d2e30df55a300401d9ae23f
-
SHA256
4e948a28b85c2d873610771494e611df53563cca3a0d25af2bf6da656e8d0c09
-
SHA512
161c6aa1d5870bb276a9e17faacaabdecbafeb39f4cf9e2d879a25d73d381ecf815c9ce58f5d1d725ada07426f4621b1f777c5a2a71cec8383a956027a1918b1
-
SSDEEP
768:JiZ7gcMiR3sI2PDDnX0g68aLRq8voTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JsUQF7QTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A4B6311-7642-11EF-BE65-4E0B11BE40FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c022f3ee4e0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883042" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000b54852b16a2587b96a61d13c4475df17bc1eea9d7e6809d2f444c800eec58baf000000000e8000000002000020000000f7586399c0878fd01a50f2e2c792800c88199b0f68546cac26f35d270a0bcce12000000082ff15b305b6b4d85918763e1561f281917fef001db3c0f0acbc1aaed5c2aff04000000002fc43c59802e2359ec65ba5fe93a77fc39e68dd52e536ae01e31df4c0e942eca56314f2f4c193b6aed512c05239bcdec11c3e3a6bc6ddd5d07f2f083bef48c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2848 2820 iexplore.exe 30 PID 2820 wrote to memory of 2848 2820 iexplore.exe 30 PID 2820 wrote to memory of 2848 2820 iexplore.exe 30 PID 2820 wrote to memory of 2848 2820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9cb0f981af8e2af0ee09d770a70a73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a1462536911243531ebfb37ce01b37
SHA1c5e5f3c3c2a50f8cd77390fb3cf94e88d20c8a1e
SHA25692cdf9160af8cfc67693e340d75cef5090a248934bc351e03049a5e582f000ff
SHA5129c9f8b039adb2df5161b3b65c2f21a1ee629402dcfed7a9bcb6484ab83988a0cc2c30f2a53921d5f6b4c184b07e15adf78994495da7a103df1b608696de866b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591737fa9e45b60cbce0ec266d9a674e6
SHA195b5912608f42342f35694db0c4af10be5bc5ad7
SHA2565c838f18ac7336bccc0373efb069762eab1ca95d8f59537846f1ecc407a8685f
SHA512c9f0b2de53fc4d51680ca8f27e4090a95a94ab678526b4c8a453e09846305f7644f3908cae648fe311764ddc53a58e9b6df43fd6e4873cd3e87e71371822dbd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5324f0d62fc318ad860384e630a674b99
SHA12d9e92ea9e5823af3941aa353bd6b29813b5d86c
SHA2562d514fc9d0b36b33f5859a6483d5ce908d1334920f4a38920918dab12c7b0e04
SHA51236b57857087bf2fac9e8878a4b5fcb68388f248a29a1c781c68cc5de854e695e45905388603d590c6ae8e38d9e1fc9c6915cdddaa69833c5ba64e768299dcda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a652f369dc3f00dbffc4edf5980fa080
SHA18ba7cd2fd561dc1bd5fe8fd5892dc88b627f21a5
SHA2569643d1996f960716736deb43a9d17ef913c832c1d10c169647afcaa0f7953fff
SHA5124a0f94d70c66740b826ee8d003e3c491d7cf4989f549dd570d852472a419ffe187dfd3818cf1422b29fb392b951fefeca490d91c37a12ee58fe7762550240cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752ef1fee96046862d74a3f555971d55
SHA1ba4fcde187d58938cd5e29f68cb5930a6cdad0a4
SHA256aef9ef8179e8f648e6f0b3f67c0f642ea3fc6d3f5dc54b95a205b8019e8ea69f
SHA5122cc26985c2ce1ee30e776ea13ab023be67cc20488231e34d15d1256310a65e34abef405b01a113a75ee88333e314260d38c98249e1a6ebae6637e69c5e996729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8f16b1cd4088c95de26abcf0a4909c
SHA13d78d5e1ccbbac0b6288de31839af54399a12ade
SHA25625889c2771b0b2bdd0fd8bfb9828f04f9bd042f39193c9d467cd86fb3a155729
SHA51246632e0b3d7d21fb9d3d94eeaa2e4f9a8bd42c97618780debe72de8712c213fb305a2f6acacda59fcb22f84c46113bbe9521eb1f4dad5ce4ae5484f3cd26cd9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee5205dfb9536622af5691fe2d1bfc2
SHA119c0699e43968c4231af2f58c4d4cfd75ea50f7e
SHA25620bcd68612dfec2ecce427ce73d7417b42e98d075a36fbd53b6739a9d0f7cd8f
SHA5120cf777c7fb702270821ee63a4458a76b393b5b5aab356e82b441c55e69e6e6593483294c63cf4c7f4526c804a0a0520f39d7424c319cd621413afe1fa022b218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529450b991507025fb546a5078005ff92
SHA14f12a1c3e29e04e79d30b0eb403b51e9b7475ec9
SHA2569f04f9ab63d5fca62faa12be2edd771ae79de282234dae76e26f7c66038700f7
SHA5124e6cb515b1400dbf33257a7aa11ed308f2f9156e587dffd5899db25080f7548f2ebbc81f610b8de3477dc185a03e9c33d218e722cfd8fa5d435bbaf2c18c2f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d016906d19126346f78af96a0aa4b63e
SHA198c4d66067bd6a675d6bb5881aeae8731f14a261
SHA2563f9f0391da94b5bea4da8c89b2a4391dc88dd304a7565b895ffc1f77178c5e4c
SHA512dfef4ef34aff9d6ab7ab152c9b03522541fa7d39f075e3f47a55a35354ac5e80dd0e1b6a1a16ea097e4cb3edf40883c96d1670078985a658109533bd59ecd053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baf5750f4f83df887ee9bc9a450d54ef
SHA1f8128a4d4bdddfb349940c94cf2db61b1ede1359
SHA2562c67714b1ebb2e8a045a33f8f09008c632237e39bb4ba1187c0d26f8c7c951e5
SHA51221b10981e82ceb611d913d8a4910ed07ad2cae5a6d30afb7bcd4e54eae9e4e4c28db2fd0e42467059d9d0386d5513c8bfc3f3d3b2cfcf810d3314231e868574a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa56dd894dab572afa66b1ae85e6cd9
SHA1a17d1fbe121101813795f39faee145c7f930a23c
SHA25653227aa00673a7edaf38e4ba16ef952a6f049d8043251a3f68a2c2964a47cb0d
SHA512146e534001164c043446e0f2c272ed8efacdd1a573f2273b5c509f858912d0a6b7ae4c1a1cd1776b7868a0c5ffa6ad3423151625ea9c650fd18410b005fda89d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581757984154354281419dc050924f3f
SHA15396e88678e99383e3059e997a5b1d8e5c918ba2
SHA256ced6e66f7f9ae189488b1f91cf228751ccd7d23c680db1caa3c557e946af75ca
SHA512ea4543d514fe6be2fb924a1b4281d2a6c55441c84cd8500f3b143b808a5a86ab00e1694159978c57ebd4817b7d9441ec81c9b54a870adf98198c4746c3be20b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de2bad3c76c974944b664d1a77762991
SHA16bdd3d540d68e9385f3d5cf1d4a93047c9728dcc
SHA256e519e05c2dc7686bbaaa2afbcc6edb5ef8f350d09e16deb1a0bc643fcb33be39
SHA512792955d7ce76044ad4b9f100a06a7670358eaca824e8564c518f1ea8d5ca515676daf5f8a119261ff4d78791c3d6521fcd13133ee1ad930f6e42eccb57c45dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627ed11756c2a2e7e2f1250085eba3e8
SHA1c051ef872110accb14479865794f13d95505e62f
SHA25658cccd65da297d547081e219998aa1a9c326eea05d8b99264fa3046580ec26b9
SHA512b15b3a5710f991ed49c80197ff3254d7a54174b3e0bf9fda0d0d44a8812fa18d1b417f39a3c697b5b799b99681186209af405012cc7fd24729aaf21610673490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56988bca6a969b13b37430c7804785d3d
SHA1a839beb7231b81a892c3dee3b398eecb6b6f6125
SHA256e0bb672ac4c535816de540518154481532e9b5433175abd659951e92819e7b66
SHA512ded3bfb1dfb1d3159a6532294c42655ff3f8f3515472f17f2f5622aba5f68cd0a2d84620fa9de177bdf01ba4dcc811c5efcdff896f683b1be31826718da2cdb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959b6f89f4ac23c61402ebe4aba0de50
SHA153833923e3591f031e0a47d753a2a1b05a7fbea6
SHA256507639ca8268715efc9a063d050030dc32cdf95966e6ecdd8f0b57ed77a06113
SHA512bac0a09a7f2f206eebc058b5a0c799e4946d7cb398ae505ade9b43dfc54ce865be230f1cc157fe08bc7b9066cb3d292b228328e1ea24c50a2d46fae65860f22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8bdecc7383bfcf6332aa7e2a1ad52d
SHA1ba221f5908a53f2c0cfbe2323a43b01431573c48
SHA2569495d98458327313253dd3bd9961b71a1a1e7f5a0e936d24d94d0b9a620e1c32
SHA51246732c31d41180c317f65e815c41c4013b3ed9b79696c842b60ac18d3c1269e70715696e6cc39bb661100e48017e61a89b55193afbf532691c5eed362948d2f2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b