Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:49
Static task
static1
Behavioral task
behavioral1
Sample
ea9dd625a9e94bd0ae1aab86afff0560_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9dd625a9e94bd0ae1aab86afff0560_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9dd625a9e94bd0ae1aab86afff0560_JaffaCakes118.html
-
Size
30KB
-
MD5
ea9dd625a9e94bd0ae1aab86afff0560
-
SHA1
ee8cee0adea93fa9bd682251d72f485f2d0ed585
-
SHA256
18706eb587b0716c7b0cfab66a5fbf76e913e3bc271c67b66bf7d6c2d116d686
-
SHA512
90b7cd498227e4c7f44fbcc3ce88a5376ec23689bd34ffcb7f58d4d33767ddd42cbf7573a1a7db5508b8378e39ed84044425111f35198203f85b0eace9a08bf9
-
SSDEEP
384:tdTloZSiTTJn3oznCn56pzj9FgzvS8Myh50UH4ue:t/413/E1UEu50UH4d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10706c694f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000bff7ae7b3365b86c732000604f258ee8b15e11009eedeb8c0744caf7953eefcf000000000e8000000002000020000000dea087fad5bfd8c0ffc02ef61f3294d44ef592d612b749a5d8bc903ccf7df7f9200000008e5eb7d08706bc67227b39757f8ea4dc0d908b9fc81f85e1986a81bf21b2cd33400000004a4e4cb9210e22b8e23582cb228c589e44e226bef3cd189ea8bc72c3cd3e08b837450bd394a9e929f4f8ace4615176e49fb6d2924c2878d374d59f0988029d3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{921BD781-7642-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2088 2792 iexplore.exe 28 PID 2792 wrote to memory of 2088 2792 iexplore.exe 28 PID 2792 wrote to memory of 2088 2792 iexplore.exe 28 PID 2792 wrote to memory of 2088 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9dd625a9e94bd0ae1aab86afff0560_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c256e15bc83e0fe9e1f2d7bb98a956f2
SHA191688215b8d387f4421e06688918b0fb8b6298b8
SHA2566f2c5aa306029998deede6ad45bb426c30bb0e36539bdf3aa5a50af3c034eb8d
SHA512be63b6988d7ac5530b8aea3fe7929cec472ccbd4efa401956d651ac2a5996d8a8f32d94c6fca15eed1a7803e1ceb7a7dae231a5ae7c8fab7aaa8d75bb895caf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f76cbc014e9a5649d91cdca6309095d
SHA1b523b6cf51b47d8a666b0383fb87890f55880497
SHA25600b72ac8abcfe751c8c66a1ffe1386787a3d74eddd8367e31c88684a0a44a97a
SHA512e2431f0becd2a3b83ab17083cece701d63e98f0221807ac44711d67f4fe60a37c0b5b49e5f2f271bb5380e3f1c4fe8c545e3f4f92be2a7ad2e1b2f058892df1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b487e3a896fb68808334b5a90d45691
SHA189e57c06947d484f4cb5867bc4f0e1b3c90269b8
SHA256aa729790ca56d576c50cda65cd11e1012a1361120871cc2d9d20782abe1cebf0
SHA512b96e8f0b70a9b4783434661f9e933cf055a8fc627fecb8111ff62d5e06f5552e98064cf4e19b839d84abbecc3cf5d91d1411aae0c479ae9c3f53265838929c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e6962971f97c56e35499f571a46289
SHA1eefc027fbe6c3baa844cbe800ffb5a43d1b3c08f
SHA256cf6d20dfb2acc74206e30beba27b262a83fd4a91d3c0cd1fc65395ee1c69c1f0
SHA512d4b41dc8b0edf16b4351e94dbc8b4d511f5017e9318bd86f7cd5ee722484c79174acfa50fd47aaa2cf134337a56c406034fb6ce40313cd9af30ca216b227e3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc82d318caecae6ac3b4227d7cb4716e
SHA1a1b039875fcf14f4a778e352375a6dcef365cea1
SHA25670e6c02c659146dfede1b109359b5c45a4019ace0299ca431f54f913e537cb4e
SHA512d9161d1020257ca837137dc1bdd584223a258bbf5e7b46fb4d707c87c8a44db4e8604611d32596c600308b8e4059250dcf3c12081626f656ae37190e283dd0df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551eae89d0677e0f4fc90b49912d69846
SHA1291ec6d1aef3c10b8b956044866a4d8a72de7553
SHA256141224915c5bbd327028d9df9485f4f8894826a57600a4b80537e80e4b122ca5
SHA512c4e9d3ce1bcf9a1ab600958d805f13ea2bb3e929126cd03bd635a6590663f2af4654ffa71172bd547dee24d0b167bb90c6599f03b9957d48c93385edcce47cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ee594ecf1a6894b9a02f84482bea1b
SHA1d8e92c9fd317a4ab9521fe22fe855d676c671306
SHA256be98103d36e807f3e90d6754b57d6e80b635f0175ca611845d2536bb902deea7
SHA51225e2c132e8dbe47c52d86286f5330f37503de05feb270bd123129a099fab2d48bfbca67e4927de6e3de6d48b85c9a92070e5e5c9f44f27cd7102ffd61afd9310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ae630f1c4d77419de61fa31128b026
SHA1c6648d2ea640853a2cb696542a3d03eed38939f0
SHA2561c084e9062b486b86694632c6211693b9bb362174533f500e9e9e409a253d3e3
SHA5126d9b247373f682849b0427d7e7c5933444675fa96ab85f7298ff83a360145c7df8b7951f142ed78061184dc4b847bd3f13263fb95c90dfa58b3df0a93d1f5991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cc6dd62e1899ad5f95733c2428299f
SHA10f5c6ed9c0e197bfc69f2ec5fb276594137ebb76
SHA256ea0d62799f64a3544b257fadd4433b7c3efe82a0860416e4c0a73008acbac5c6
SHA5129177be3bf580cea8d4e04de08859b2358e5f34287ef2dfc3f47c6c8fdd9adf41cfe6d583ca418417a3f0c74fa2c7950565da3d88f061fe42a16622fcfd72edee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d14eac678d0eb0aa09a5c74ee4f0ec
SHA175ee2ae7d9753f759da3e2d7fb75247d628e4b85
SHA256c8b143c5dd95349755da2dc243f9ccbd0bda6ba14e249e5dece5a00586e57753
SHA5122dd50f3c90e336689e8185085398f01862b8135b1a32f1342425acfee0858cccb42eda26cd2b7d888a6597997423401dafa11f9dc294264869e6f9d13279df37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e871ee4fae59d779768bf6bf54256b76
SHA1d41ac5518bdeaf8f765ca2a44b5236423a81e377
SHA256ddfda7b2af82ddc807d306584692f5e191ddd568bab7de8bd5bfac081d3cda3c
SHA512f9c3ad5d9c448af91838b477f83e4c24298849009ff000d48e5924805a3ccce3f30567c99979b3e93ae6c9d508d2f00f08ced09059dfcf1ff6c1f5d59335ee52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6f4dab11ec1b67a9872c1e0f7c6076
SHA112f16138b4fc61a4a5f40b578733fb3315cf8ed9
SHA256a4170e347460d90a234d8e769b157771a44d2a5aa489ca588ccb3bbf9b93f6e3
SHA5122cc7c9081c3f465770f4a37569cf025d2aac05deff9b40a8d4478a8b6c6a53e61cb6bb9493518fb353fb513d0a19480733e9d059f2b849d27886f7716825fb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e8431dd7eda3de67c37a41dbd25736
SHA191f51dde4c13176c58ae6ff1bd686d1300a4f807
SHA256de7371e7495080db07b1ca1f2a02a2c877a088476e0881e49a704ab050ab3e60
SHA5128e3d77dd8086c2af81dd80a45d4ff797f2f518ba7905813d256e61d5134b7630921041e630e448ad6c9de4eef67ae054ddfb0b1f61e0bff9abbeb18c74c6f28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a48b8f9db267c6c8b5e7d654e4fce9d
SHA1470c780accf5717b5e38ce4eb3a0527f5135d392
SHA256dfa8e6fd11297869acd2d4274ae205654724d8a3227261d9b0b50ab9019f6713
SHA512734afb4ba7f5e33c6ad68358a10911f02e58981b16a482230b35a12aee45991b56a33470aab6adb60bad9cdcdc62a8d4984e093c73fa385d3d7919b65b2cfd87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e6cf6bd4f82d26e10cc94c363d6bb2
SHA163fd75e89f225510ce5c8d031998f311c984cd30
SHA256c307f70d010c68fc5d4fd26b7e94745d557bdebe72a2dae30bed676e31aff4b9
SHA512cb4fb82c182596049e8ae0a6c1de3c424fd752188f47c4e0dd8603ed3de240e7287c949be92b3000884316bd16b194231e76d62bf6e7568c7adc49c59d5f0aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593500639bf418c5a12e30401829aa2ef
SHA1a7ee95b390ff7523adfb7a2a5a9a93e67301406d
SHA256e322e31ddf818e585390acc31a0e337b5d6f2c8623c26a0564d945ecaf69514c
SHA51257267533f4f61d787fd7ad6aec17c83590040c335746b2ca692993cffb96f18c921b58b9b1875b32ab4e4e072d2244e0914303ea0bfb78bbcadc93d074a2af18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fb52966046b89404a08a635c57369af
SHA1c9e901a1d54dc1c10d8ec230014a3fbf74165533
SHA256aaf229d7976c4210b8a14aa48ea4f2bd6fef0455fb375e8492f6fc37f130df17
SHA512caf1b88572cff7ed5fb234f2ca349ab9fc7e1095eda6cd0b70c0d08fc31df625bb3511487b09d25ca6301dc80962cbe34c1b37506c88817cdb6cb9c2901111e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e13c0611e9ce435692f0f14eda3247b7
SHA165482481add656910388c426c6b957434b653ac0
SHA256649b22569e0de4e86d42d7d5b1d559d243b04e605cc00405d7ecfdabd00c0d49
SHA512ffd6a4d3413c94fe2a5ab7425af9f24e228391217431e8a17fa0fce6739ce3a173e996c5f48af567f9d8883eb7fe4c90f753357b9de91b4810ae139c014dcc27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea4504065a4c61242e235248019f588
SHA196d9ea712d17826a6a9854d6baee91ea72e0f69d
SHA256609966d06b95cf1873fd2d74bfe04bd5bfed6ab08eefe9dec466c340a23313b3
SHA5128093b9d298f4f7bd4c2641d691846a9a5f4ac29aba07a0a06917bfd72be65d61698ef5721bba44383e7e5bf48e3eaac92e72ca09c45ebad6a61685ba56070654
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b