Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
ea9f2534faece006489d99576856fba8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9f2534faece006489d99576856fba8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9f2534faece006489d99576856fba8_JaffaCakes118.html
-
Size
172KB
-
MD5
ea9f2534faece006489d99576856fba8
-
SHA1
2ee3fd3db10a5ccab6c4c863d88f7203eda352b0
-
SHA256
0602c324d708037b84f7bfa77af9408737d19c27481573d612340725165b9a60
-
SHA512
27c217188f29546cd69a025f1cb1dc380803e28f030c03d61c88372de11cd86f4465a3b2f949da607772e9c54d8b74c3d6f6e8d3bb94b799baf20c0a8424b892
-
SSDEEP
3072:SPOgomgVHj2LbbamS/k18Q/MJts8ivXLwbQWNw3SW7jEU5igMArZ71pyfkMY+BEu:ShgVHj2LbbamS/k18Q/MJts8ivXLwbQA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883458" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11AD6F41-7643-11EF-9A84-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000008a48c187b5d0214e92aff61336fa58ce790772a39895db4cc25ac703ffbfdce1000000000e80000000020000200000001a5f2e4c544d7588177bb1844c642680722431661ec3d7aa1ca9e2a65d11fa602000000019b88b2222b66f03eba410a1393155a5cb1e39ee3da1f68025476101283b8b8540000000a92c27aa19164f321c5c4351dace767f73730a4e555b5929d5aa1bd3b71d6e453e09b9b522c8e6c82e3b718092df21e14bafa0177df4607385d901a932ee78f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f07649e64f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2916 2400 iexplore.exe 30 PID 2400 wrote to memory of 2916 2400 iexplore.exe 30 PID 2400 wrote to memory of 2916 2400 iexplore.exe 30 PID 2400 wrote to memory of 2916 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9f2534faece006489d99576856fba8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f889c3ba41c9fd51eaa126b44652a6d9
SHA12908ceeaca7543dd3f4e6fba12a5f4d688ceade2
SHA256e34bbcb315d4fd0fc71963bada26151b86b17cf8057ee3eda9bee3affa304a14
SHA512f298f0c8459713ce3cc14eec57878b932f4d0675aa4b004b5012fdcdccf634febac6f073992854640dc2fd6ecf74315e0ebc4b9f93279b865a4fcfb181783090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f32816daadac462e1e8c44750cfd4dc
SHA10321fa46cbe5cbf6fd4ace6fa05d4254b0fde383
SHA256db30c0f009849b80cd1fcc5be281dd2db7f7f2167babcb0f2d7daac8f8d8aaa4
SHA512734c8c53d0b5513a07d2438688f206cbe1b42e9a1b10ebd29127a9204ec9c4cdb01787776b110fc3abe8e81380db2708bb48edcab07f1147de07523dda024513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc95e2948ec3a959f4c07914d56b187
SHA15415a5b8550a48555337a53934bcc6d14bc6a5e0
SHA256a1713a46c1a24acb48b005f4b6a205afe7a160b59df52f1c29d3254140ba267e
SHA51220777c9dcb2fadde4128c4e70b7db84f21a445bcc5f1be349b982033903bfd6b6079c5c3f2c787eb5a55be0e23f25d03a8712e91451c6e1a70a74df9aebe1617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6131124dfdc44c04f17123dbaf0817c
SHA11a2ab5190ed3d6c02306a2fca8f819ab14c1365d
SHA256785311aaf4948164a872ea2e816b9565e129ec235266822b73f49aa96f01a5a9
SHA51232c653c85013373764e351580a670b14e5a35eb058c9a719e9e6eddec9085de09d13251a1576138103af7aee2bebdbbd2a3f5a922ccd88077e5197fabe0e343b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a037d071d902e292efb5464a60afbed
SHA1c8e53efa309bb0fea6c0fb21d70ef6d6411cd58c
SHA25631ba9b477852b8db781e498402db46e0127e64b4781d486badd9807ff2e018c7
SHA51284bfecd16488357fb1d99cedb8d382005022c0e858e81b7ab4f6cb6de9d7a3f75903b5cb2bb82d65458cb830f9141e3717b2069bce1aad703eb02c49cf56dcf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597403c7705eb9085a32978d35cd363cc
SHA119ffb5b3a22004218d15490a668cbb72ed682236
SHA256dc6de0d92cc9a75abf23bc3b3d6364f80ca9a67aef3f1b671acfb02153a7289e
SHA512a361f3f08d711b5009414f14c3ab2ac6e83c600eb58e1f208dc3f2b3aa1d19c9ab02256b32436b62f1e646ac0e599d67b928ebbd009c6dfdd2489efc4310d41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6d3d0c42f11e52c6e2c5a94e3daa160
SHA1be0265542a324867216ad3bf699a286438887ca2
SHA256dd00ed23562a88730affb9ac137b3aec7466e7ccea0b7c0e7003195a8f64a194
SHA51213155717560055ec292e1a335af94bff481584b85275608f81dc2a5e79899ed10b73116e04eb3b2432ba014609c8ec7da45eeea50f2e0b45cd4ffa7afbfcc7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace1ff8fc3e60ff401021e11298f41d7
SHA1cf520223765ee3435b0e97f69718623bcf7b5a3f
SHA256413728ec69b6fb3d86e255080a8eed2af601bfef02d48c4cb5becb58c6050b5d
SHA5127bad97346652ec1b13ce814e9bef7d1b1388baf6acdd096545423dae31e3d77a44160b3acc52c460e13f5892f53b79d73dd6c6a6ff8252e85952ea3f9f51fd31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81d1a48f803c430c79d6545f217eca6
SHA1c4300bb55b50831ddc447d18e4cdea721364e434
SHA2564e3d659efb9f4ea0c09bcb65afd234153acc8b47bb0436a703fdfb8f4bff253e
SHA5123502a799e06bcfb4ff345a1f41b2efaed33802b76155958e8b9c6acd721f79dc866c25902b59e4efbe6f5bcca200cf8e4377772d9b9633b4b731c08aaa4decc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f82b3b67162444857928ccf3835dc2
SHA1e7b9f814d22562d871f372d69a87cddb53675ff6
SHA256146b992a53fbb0abfdfaf5a793601d33a257d1606c867b58480fdb68918eb69f
SHA512f4e0864020e85b804f5c05fbce589be2a06407242235b4670c6e31c48d46e120de747da6fabb770b4d97a714093cb616a06083238f7f2319d4225ddf4a0de0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517492628b654681a7f0d56d17236b177
SHA11588c796c93bb500af51740fce0fbf6d2740b211
SHA2569c53dcdbb031870cc15395bfe120d9db0fd56df5f81555359699725b6063ddbf
SHA5126948752eb75ebfebeb835f6763690ba1901b5541aacfc6826c9d6c5480b44b7caecd8aaaf720651eb20f493502bfa115d9fd2f91ec43e31c222eba3e0e625613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee1e94d022dc13cac4673b2afd94553
SHA1a05c658edfadbde32e8f214e57afafbf4826917d
SHA256b6b6a1851a4803ae2af150b157017c911df0aa3a655c6f4930cfc82b6c114d7f
SHA512971922ed58db97cb2175a7c7132b697e3656cd8ab0d287206c29e8ce3fadb67232b9debc76697737fb0cb3bc1747e49fe57b2655b9a06f192b7402f4bcfd324c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8d3033fdeebc9661eb3dcef9bfe980
SHA1d5006eb4b3bc9410691c437a4c91cb5683c5d533
SHA2564926ae5590a8bf217e25e26203b0bbc2f25f0b3f9bcda888ebe7f8b3ffde6fc3
SHA51212903400c25690aa950e54a24c7fdac5b1866be78ef660968ec86ecb75823ecb2fd4e9fca94d34afb9f070bf5a889c339f08158ebbc230a7565f1d102ef2de5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e414738f36140b7439162b108bcfae4
SHA1e05ab3ac99a070001e4c5ccd4b3d7c2e398dff7b
SHA256e155b35da3734e7c49a5dfc6713ae9eefffc2fbe7fad2cd77bfed54d4f6aec63
SHA5129527ee511bdeca0e50123f882b77e10970cdeb020e054d570515a4734e05657eccc424820459fd3d41e873dc15ce7d0758ee1c3484a035d3878839a4f934adb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7539da3254d387b1ac705164c719a1
SHA1dd67ea06567c2c6f85c5f3eface274bd95237cda
SHA256dc72143325c322a05bd6a27cef40b558559bda3b5fde67e10431ec065d3d5b33
SHA512ebbed46465a47a19acc2d19f9a2728ceb4f0b684e4ae0da723a7fa43c2f8f72e650a881262e4a21fdebe89cedd5d54668fccde4cbe689039831a195746845297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5256e3cb146c5aa0964dc584a11abd1ef
SHA1fe9f194f8a42cad28ff0a73e716a45541ee535d6
SHA2560fc62629d047b26357de5e60da76940480face6dd3de7222fcba4f1996c177f0
SHA5120602a0a2049d52b4a5468d2cd97f29fad10230e83bf3222a6496cc724528b1d1019209d23a1efdc2e0131fa7cfafff01cab7a641dba5d8433d039b4c2a9e0146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b7f044b6e91833d95d43312c01aa4b
SHA145f2d30ce93499ba019a42b5f093eccbc8ac4c6b
SHA25639342849a1ab3b2ee41581b033c25346f1ce5dddabfefaac5e9de7250b649d35
SHA512307091c8ac24ee39093469c9b00b68e411fa341b284a2d4ccad510320380ff9806d923ff4e15cbdde5241130c653c12bbf6e2c910f51843085529e1cf8954ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc178538a332e711fdf426dac0b0fe7c
SHA190287482d98bb7afecf531335de70bc2f835a42d
SHA2563919b997e0a5e445d7ff5352867de3719e48a0913a89e7df22483b7e99306bdd
SHA512489e27c704a37f0b9a8f3bb0834ca89050cbf946e63edae50c79f73ba511c2781ce92d1281e6bb4601685b906de6d9d293b6b58a4b708a6555d2d12126a0e07e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b