Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
ead0f775888f6e93b4dab7352564cb7c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead0f775888f6e93b4dab7352564cb7c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ead0f775888f6e93b4dab7352564cb7c_JaffaCakes118.html
-
Size
10KB
-
MD5
ead0f775888f6e93b4dab7352564cb7c
-
SHA1
b624e3c6db2515e67416adb63210ba998fe1e483
-
SHA256
ec71ab8b59485122c44148bc4112af81609d0cc2f5aa267dd05406d8c623eac5
-
SHA512
d0b8389874a1e711ca3223c005dc2948c991184008dee87124392d80650c1ff1b267b854d549143159d5a06c649261048b36cb04db27af0ec249a6c00e872c42
-
SSDEEP
96:SYo7izKi4Ndv3/XERmFqcJKOlSjIi/pItazQTkRi2RoWSXIHFGZ7C4a+9XlcebPx:SO3yiZnQ4AkixtGQoQHHKpK5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891433" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0010f493620adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f7d36bd7b8c256130a860dea1181c27bd21b473d329e897e4d28b755ae21ac59000000000e80000000020000200000009a370adae9afd3a67873632b1cebfc637382eba4036517fd634522ac2497f49920000000999b225aa628c30168819d346746b74e0603683c0302bc5cf08356587e142af140000000c1c8ae144ad6056ea1ac484762aa2c277b89a354ffbc9d83ed06eb278fa0f14237ad192c132fb0d1b70373aab774364021f0be3839ffd04dcfa7e3be2973a05a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3BD4A61-7655-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2504 2508 iexplore.exe 30 PID 2508 wrote to memory of 2504 2508 iexplore.exe 30 PID 2508 wrote to memory of 2504 2508 iexplore.exe 30 PID 2508 wrote to memory of 2504 2508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead0f775888f6e93b4dab7352564cb7c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576bc995e316117fa5fb3ebed80dff9d2
SHA1e0ecb3923497a993151e0776a5d861dc269ce3d8
SHA25667d1a9302da97aa915532037a9e5ecf617629843c4be478c58406808e13ec3d6
SHA5126f7541dafc3fb3b2332f3e48c335a5e11f0a0998844324ce3e7743070bc636ae96a82ad2e0e112c29a47638231fc5dab36fd70e3b47689ac14a903dd5b24e77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56214ff01e029abc9f2033a4eebbfdea7
SHA196ca799035f9ae35a7f7f6387ccc62a191e02250
SHA256011eb9e119895ba2f833cae85142cfb607a9b09d783d68d7533617d98a01442a
SHA512b3cf2cd2d21adac6b9e89ac5d9a57472752349125072636ca751189b74b2c189ffe89247a1167996b0a3ed59a8f91250d3ef70464f0c538600faf8fe10b9b3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5022b398f1312407a182c903612adf328
SHA13f0de8f07f146b0b110134fe71814afad89bed4a
SHA256c5c0a7b59f8c31ee707f405c4282c5fb2ca2ed2c2969d047f4b451ac1920869f
SHA512430d49897228257b4580f0f201f16b8e2b043da01c27e278cbac0070e7d703e1a910df86a3f946c725b855432bca7bee1b337e64a71e192ffcd1e81cf4d74859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b94039014d6e0ff09e25c4df86af79ae
SHA13768911f485cce710d32200f69a6f9c6488aa028
SHA256c8f212b61c6fbda085815d91d93dd46821035a4ad6c026a048fd6203c7c528b2
SHA5121788fffb0596e32af3e4b489f51d6c8edccb6598c9b42247551d90edb809e95682e209cd943641d443ef4ffcf88a835e7cc543d07f13fcb3973828636ef5df04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed26e646bb96a37f5f9966c084369338
SHA1d8f9a7c4bbb744ccb1ce7c79f76a435b085bab72
SHA25634871d170907b2f040db8f958f9e06c8639eb5a4aeac127762d01a4e18e26b84
SHA512bb90e453e4e05d7da232581e7e928c3e0cc69c84586086fe098dd1226956a72c982a0fe83b1aa91b63a5ba8fcb4e7ba7a54876651b661253e87e9f2183c89f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446f1b51b93439f15efd41800b534d02
SHA1ab4e3a39150b51b029fefa84d36a8b2d115cdc41
SHA2563503343145c07652cb1560a511a750db17b282f45287b34fae3f1e0572caa1bb
SHA51282371841e79fc7af49735cc17eaf1dc0596b20e0c7ead6d075e57a568d9f7b94530b18bf0387331a783b198de4bedbd1726c5184f2faa927f93f975c48200a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450cee928bf6904cfd9ca882fbd4b964
SHA1b6613c0158214085662130a1039ea8cfe595a603
SHA256206fc3072ec718b8c66c0ff37c88b996ffa30219c86e49cf435e58107bf2a270
SHA5121292abb60eb3adee8ea9208d849f1994e4ef19bc39069aa4ee3010e19065a253fa3f01a351dec5ef78b617f4191936604ad1b97869ff82c09024deacf6420419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df868e8e5622b5016e4a738a08e18f31
SHA1504a4622fc254fca2adf54e291d82bee4f630905
SHA2567c82307ed5feb561b6f88d88563c2ccdd7f3b0bb0e10d88b1b3a100ae24209c0
SHA51263721c5de6e8054ca3fd2682eb0d63dba882b674cd37552bfa5084a694673a4a14b36b2ed1d698c6c615623124331d8d7187fa9e72761d9957c215dca9bb356f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6831ec26b29eaec98022d68eb6020f3
SHA159eb17c99931e0d7b49b4c1640e451bd82179f19
SHA256f79f9ac9a7168feb2444646b1e7a01591cdc43d9870db31f690d54500ff9feba
SHA5127aa0fd92a667edbfb9599b32b0fa47ca37e5f38677ae421a85bb7fc007d8777516d37fe504ee2d8cc6443d247a36faa6098acb6a275d26c55d6ecaac67b7c25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4a5ebd1508e79da988c1f9ee14f369
SHA1355ca4e82e5c645ed7373e244857d54ffd36d83b
SHA2567c4e349af4e4cff4abcfbcb345175fcf8e766783143b80a48a17d69e1f635fa9
SHA512a5bb4d0a9a4332210c1e2c26e964cfb837f87e24fabf4a92fb41e4016850e7f06e9ad2711ae687c6b7fe1a1bb8c52df26f49626331de8dc9c2b5acb6b8204973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d631da5664835ec79639387004596b
SHA16a6cf140fede62407ef24cf30d3959d29c6c89c8
SHA256c8d883393b771cc87b8d6a6a6f060f9d28afad3fac281a241581c71f42f130f4
SHA5128510174d6c3e7ae3e782b013f6f3e48b8e55c1dd88f938bc9db211f284344fb9685f9d01db1a829c594424709e7a7769055ca44f0b2baa328abb3cb948d4bc43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a425fa036abfabcafca9a86da3053f8
SHA18df6366e812487ea90da3e6fee12a6f7b2e4ec78
SHA256a0e3aee2d547fd5edcd867ad97025217a0ba0c457ede7fb6a71d12f06db913f0
SHA512a6c0707692d398bd7677710b426d6582c55dd1db791705c186b6228e4d4a60d3379a1c0bb779222388ba781f17da850f5f400ce45d3953fda7a8dff390288c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e34b966fd173b2d26868fc4ecd167eb
SHA15bcccb17a735e83817d9a764c505420cb77acdc5
SHA256efdc98fef4641091991958719898636a5a786501c6f75f6c6673b5f72c58a84b
SHA512d2423d5934be506c186683e3c43ebf3aae183aa92924aaeaa7db0e173afbabfb5791ec78f0dfcddbdaad23ba847c67dc4f4b92a81bfc2f075ca9b7defbf2a4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e02b7772f60af25c2775bd2b47370e2
SHA140ccdafc46905b16645c6e9287428a79668b92e7
SHA25686f1f72c72ada368637ccdd296803a779be3bdcc6ace489cb78abdf27f17f31e
SHA5123d17b97e8ba3e624e13de483263ce97be49a4d8217e1955d1d0a8ded8eebc25fb87718d97e5fd9fbaa024c1b6ba3e7d2b2df18467a9cdde783ee6171f3376bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b4af838bd3491da8adee0b7162f8d4a
SHA130310fe13d7a6863863ceb3a544b762017a50767
SHA256584c0545030d6090941c128c746ee708bf11205088ea0f25478212391fcc26cd
SHA5120e587874791eccc8b734a2460bfc55715a2654974395d05000e9082a7aa8d05845e524567091673c0cba782859244f123b1b40876994667a410096229a38ae57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1501d17b67293a8f38108639dc6db6e
SHA1221d76f94ef6b636316da90d9b19d1b2833b0551
SHA25694bfa4a75e76ada1a3bf416ba51c2d8fbdcaf007d3c4a368d28ab265fd08d4df
SHA5125d741b231b020720a01369a3cc64bf004c7467350da5eb799e3cb5c70e1e11554e78e90183fd2f6c4b61d90d971f6619d68744f1c083716e740f5866bc223fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1736298207514c499fe94ecd61613d8
SHA177f086d233f905fad1e90df07c156b11eb21532e
SHA2565570be13f03b6fdb75a4b5d3dcf621635fbf0b8e12255613e30e940e2eece3fc
SHA512744f9e6e9520724b2fb244dbb90fef6fcdbf1c09a659ad9d2b2a488ee6c2180dad477b973d45a85c2429232328387650e6fde7f7031929737ba15a0b658edceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c254fda6c75a19474062da7754a21b
SHA19e9a23c661314f1bd071b5b40fe426182f5e0e3a
SHA256cbec9d8c7e10de10a6446ce921f7652c6b9ae09b39479920c76fe75ae981b332
SHA512e27413e15a43c08620debd394263c60721502aacc68cd3736c4a104cd10358293fcd81c159a1a5dd9c47ec1bf9a72cdcad8db913ce94eecdee0056f3f3245bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592067a14f1f788ad6459b1e2572d7b07
SHA1c42d69c250a5da3be89cdb7b4642faa5491fe80c
SHA25684806513174bfea47c344bd7804ebdfae9804ee7368c46bc7b386a192b1c86ec
SHA512ec70f5edb3c7e1a21388ff83fa3a9595c33c7127b3e3cb347c1cf4abf7c3932585d41d62e91c6ee0fe885c81c29c267250b5864ea322aebd4d6edfa0ca5f384a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913dc74e944cdd7cf12e96392959e89d
SHA1c4767e28255fb75e03b7bcd42076114a03ee890d
SHA256428b9ed18158d528000c75b239fc58331de56f64c94e91c6b4231a7c7fbf8701
SHA512a4711fae007f087e7b2420691242193479bfc87a7e6950d242022a10432fed31fdacfcc9cd519577bde109244c6fde9a360ee01233c1ef37051e93eb96c409b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b