Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
ead3eed1f38dc65de5bf9de934026f62_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ead3eed1f38dc65de5bf9de934026f62_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead3eed1f38dc65de5bf9de934026f62_JaffaCakes118.html
-
Size
4KB
-
MD5
ead3eed1f38dc65de5bf9de934026f62
-
SHA1
c4eb3cfb651dfac47eb63d89ef5482d5cf8da64c
-
SHA256
c51dbeee0219a05cd6a215fc63c3ac7656e15465c638c0413569c3be6c9112bc
-
SHA512
25dfdb5c2c85dfea21124fe46e14fcb8757b03689ab580b1b192a6772d9ccdfcbbd41093f65a9b3c8eca294ddbf7c9933f25e444d38fe2e0f73df71281dcd232
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oEr3d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4047ae98630adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891918" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C42F2601-7656-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000363778f2acaeb7fc1545851e6395215712068388f0e14af8e54432b9a7a8acdb000000000e80000000020000200000001b8d4ce066a829a1f1efd393e77cf215f9277a9e58212cc0e77f2294f98a092c2000000025a573c5b2c119756091be829e1586359f20e2eb158fad2226b4c55a84c4b78d400000000f9b4c4ac366ecdc567d434b1ead2367ac32717e8e63ef97c16c090405b5247ea0b5c2f372d1f9409df1a828b28a89cc133c757f6bfb23582036185b9f0f6724 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE 2268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2268 2876 iexplore.exe 29 PID 2876 wrote to memory of 2268 2876 iexplore.exe 29 PID 2876 wrote to memory of 2268 2876 iexplore.exe 29 PID 2876 wrote to memory of 2268 2876 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead3eed1f38dc65de5bf9de934026f62_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50229679a1b3986826b1aebca071a6bbc
SHA1a5b1b913a6fb3097a5bb153de43e99dc35f319ad
SHA2567d30ba8adf264e9e4146b64e1a70a92114e31799dad6179488c7650305351082
SHA51201c371a339339d6f7d5387d3216e644f20bb21075692eac9d72605570c459ceacd1fee564fd1567fc724a8e1007e25a498b7c96335c0811dc0a6238e3e1f05de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7dc331cd92d65314208f542aa683486
SHA1d31e80a5dea25d2a03028aa18b482f34dd4ffddd
SHA25629adbb45e415f390f53dcae63cf9d18c35d5385862e0cffda538ab6f2b530509
SHA5121dda4c86e8b5fb189bbf4c364a503e44537a8482ff7ddeeabf3dfb7d1e10576307ce17d30f55784a7c049fdf1700a265a5e008a8c0c4b144017cd515720ab629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cab413ad0e411dab4ffa3495772af44
SHA123d09833d78b9e15c8ff41decaf517b9c9012f60
SHA256b364c4bd223dd3585736731116182863be8b1667123fd64e5ae4a167e8e1abb2
SHA512db2f3231f5cf6446a1cd9727405783817ebdfa24e3e42d9f63730ff8425b67db6450b8b2027d39ae2335e938b8429d4e6bf2d97719e8a1a14465697f12383946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f98c7b8b575b2e30dab18e1bfd55e2
SHA16379ac37d67068993da956a16eb6caf02e290e4e
SHA256f442214ff2440479158ed7e35715e67bb3245cc8166d6a78571e0c148b844b12
SHA51209e823f5be6da132502c726bc575389df7ae73d441ab56a4564d6f25b9ec69602f19246e599ef19188f7f8ecfc66612db4d1c540c33dad78d198f3960c677217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186047c88daee45b3611fb7ac019fa5e
SHA1d176a4b1bb3b043461a55700f94017d28bb519de
SHA25651e4a413266ac7edd132bc72d79b5b5f5f4edf97d6374abe609f02725403903e
SHA512fe78db81bc049f499e800c5d7e627ce31a8f40dd0736024c0adf446a4aa479d345d8a7e7fe5b46f00a26f15369c34e39811feb9b7ad7591ae921b3ff2835afe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57277c03bf5149e23a1f34d29a319915c
SHA1a7a3e4791bd646c957dc38d49b32ab77f66f5aa9
SHA256a98d75c3bcc516d839c2212594566ec2e88793226ae41a86da05f533e335543e
SHA5127faacf433baa5464dfb8d20e46bf51e519aa1899d67da9aacc18b4bd2d5b71dbb1ce6ae43ba87b5e61a10b5335c29c1aab5b2f4bf3a596029c124425fad006bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a709dc353fd8c7c5183f6a69255c82c
SHA119402ede965809b2dc110ccc2109ec5dae93509b
SHA2564da41b300dba168e4dbf28ddf16b64d12f357c5db00a3c1520e9b13c1b536717
SHA512932a47a92d4abe414bac47f17990d2eb65abc60408840482058b2ba0843edfe39c23fd118269204bb3fa8d6cfcbbf2379075007bb3f4e0884ede69c0ccf3ff87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c8aac315c16e2dbed134cfb65f656e
SHA121d8ef02ecbc23e2e420e8cc8260d0b4fef6a2ba
SHA256bd053bc8c55482c70e695a7b247c29b18d4a63ec3fa6cbadbc4b77838e36b33c
SHA5123ebe8ae38aeb9a6a709ff687b4b45113c478a882c4604571fad15e3b80b5ba7042fa85d5aca53b9e9eb5f3bc097fb685a71ad3a2ca0d11dd7c3b2aaa0bfafbe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595983dd92b4901239714be9ff18bbf4b
SHA1300e99577673ac33d989a212446720ac9c911bfe
SHA25658c82d79218267bd86d75d256a960d79aef034c6e4aec2666571100ecaaeb6d0
SHA512aac1ebb589edb4fd85a6d0f20d23299411fed9dcff225c85836a1871a2db9cba3e214ea7e1e6f31d9f0f09b176e1adc9828f1759dae893345f4b5dfb8e7c12fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5dfb07d71017b6abc75fd38fe0c88d
SHA13fdf58ce83313e3b1cee8e31637093741462e693
SHA256740d03d186774c03d9a5ae5052966d89a43a1a3f6524f6baaeba1dba4977073b
SHA5124a5bfb63277994b7857be47f51246bc513ae3da746fb72ae1c827c596ef968fec8a09fb483617f864942997389f55607f7cdc8f7010e34eca61cacd629b1ea78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6ca07b787fa9f67f182ded141806fd
SHA18a49105a3a94f18f7a2bba8102a0dec7bfe5bbad
SHA256bea6ebb3ac7366ee5bbed2a6da16155301cc1e00e1cdac69c978bbf131480721
SHA5123ecc15bf6c95b8b2f0406858f08359cc1801abea93cd3cd72f82aaf4dd02f0b7bfc552a399ad45d2118d01f0c7ac2eb1840d53de9fdba6247c226c3cfcc2e031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56318ad32a02c2c99d8812d3d9568ee75
SHA10042843f9fec4883dff8c9c3ae50be2b6c33b62b
SHA256d529df28b6aa5a5d596c25544e3a2d243b81f2adccc11d6093b87f1406e87f17
SHA5128d0cb6b71f6e1be4abdb5b296520a003a0c95a4b68c7acbea591f5c5301354783f5c4d03d1720a81d5327992a017553333c41e90f05a84bb048bb788d233bf0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb2983d8c5716f567ae37a8ec8c41c1
SHA1dea398e2933a1620b45a9889ee5899249444711d
SHA256793750edd3214238575254f026dd10395a00f6674dedf8f8578e24f7d97cdde2
SHA512c965a3242b98c3f31904292964f3eef39bf15b914d498000ac7d0112e212add8ffdb9915bcb8d009eff6934cfa76a34f9a8bae9e34be724fed5302a410a06932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56586fba3571524db395be2beb9c41a71
SHA16c87c4b26a3e97279f1f75cb8ae24556635e8d15
SHA256615e65a14e786b8fdd804aeaa688f380fd4b30bb6d77a7a81cae287840bc1277
SHA512a627e1b9a35e7a3d62ae0548e30e9c9ca07f5cb46fc6d272d0c51062af5cecd5bffe103860230e5a1b709cc56bfb4466822f551a57e44d13a9e320af50acc1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5a7c48b57f83dc92c5a3731e0f6fa7
SHA1a66f1d63c7faff83fd976aeb34f9271d04b988b5
SHA256304b036dbc4c6c334cc3d7adb11b26bf11bd1b0896353abc7cefd3e4c6233886
SHA5126c3e58f12ce244989e7414b4d41fd8c820f5b9e3ece84e906e5111aaca8d978e3bbbf201a929ee3a35abb9e9c4dbbbf2b8a632dcff200a1624565527743c587c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523078a4996bb0a1277067be801c277b9
SHA12ca83c78d1b865201ba37af704de30f196e3d5c6
SHA256b5fba44a38173f195353c54db2547890a9d62e8b4f35519491ec935716544fa8
SHA5120a0f1662ea503221d9216c1d81edc2a3022ed10e72a6e0f18d801d01d427fb22c813a364bd0b3900e4ce4df23af4d3688147772958d9c2513ea62de92b778de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53000e83edf4c16586e12b88a5c094281
SHA1c5c61d2d84b36c4ce67de4038a2578e7d0b4dd7a
SHA25684bad6e6d6b94c378901354af9d84b90df960bbfbdd4b28aab4b859abf1f8882
SHA512e5eb6d3a3a889ea4645c50c30b91dc98cdcc84df69eb0a83e6a35d2f0ffdfbfe31ea241d97b02b64e169913a997f8f57b6eb0c43cc146be17d756a477ec6ec9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92abc9cb86fe856881e38d9a4b8275c
SHA1f58b7d2fca4753ea00ee1d8623fe3baaed4bf0a5
SHA25630f1f270990964cdf48ff560c1f1e0ac9533a89c86ba26b15742c1fc51901926
SHA512f1c345813afe18ec76ce769eda074e1d35d11998433362cf7fd41ea4b29891840608130294687726ec66c0efe416558323c48d91b9645d26ab0751b9c00c8ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353b77ea98729bfc2f9ab86d4d23a06e
SHA195fb5bfb3325aad22ff2642734d677330927b23a
SHA25692221ccbdd31a6c81dbb69f578321947e204dd3885c704049ec35575643421e6
SHA5122a0040cda0a6574bcd80a8329effa1275ecf4215c92263c69838c3e32422ed07e7308fb666221716216482eeec5c63622da643a0ef0bed2164b83acbce602fb6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b