Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
eae212b75d196379ce1a4af0994c4fc5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eae212b75d196379ce1a4af0994c4fc5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eae212b75d196379ce1a4af0994c4fc5_JaffaCakes118.html
-
Size
1KB
-
MD5
eae212b75d196379ce1a4af0994c4fc5
-
SHA1
f6b602387743d4976d482e4502f9d01f206ba973
-
SHA256
1d5d46686bf971cc07310d1fc866bd2caab6ee29ace46f042f3a21d921d5344d
-
SHA512
fce63fa8b722a487925105244342bfc04e8f61e9925fcaadad1aa9ad00f79f73690a1e7b63fc0961b88a1a9191c5495e36a79afcc39a4dd699486d2a0c15a5aa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A880BEF1-765B-11EF-8250-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432894019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09ffe7c680adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000dc0a8fe1dd303fab8c2be767a45c637bdf1763c80f8e8e5217f9b026023470bb000000000e80000000020000200000002f1da50dec8a1873b449972bc08434983a0c60b91bef2b736fc3fde6fbe7694d2000000066f63f4492444d7aa7c47ada7358380126f68f9b7a9c435e5ce88c0cfa91b21040000000f297d2cbde246953d43e270e222b0ed6c5bf427db38115784c709ce0cf7c4c04e8d7c2d5c5820d5afd4470378d5fb49c3b184a306bb2dfb47ed4332c97508215 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eae212b75d196379ce1a4af0994c4fc5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f15111a16d6b4ca712ab11f0f429509
SHA12fb5252f6bdf480e9bdc7b1990287e82dd0f07d6
SHA2569350ab207c1be7a876e6f30acccd4cf891eac772361d77693618a2b648788590
SHA51295a465a5bd8559a6111c86df9299d5bff5ce85488f790cf4294f575ff3a0a9a06939d569b1c7d3013bce0ea7bd9ac78ca9b735970057ab22ab570708a5da879f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5780f282de830f5de4bc56408fc687d80
SHA1c7cc87835ae76f382e103fc4e831b3cacd0d3d83
SHA256ec8dd9b2be2a641d54c682b0d84b7c23b090477f5c24564af086b406c1abb517
SHA5126db109596f19e8df4047f827a5bb234b3dd68b15273110138309d8fd2af45c60240e681122288ab9d790d40685d10a2693ff414565bdfce77cf00d445b618985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ec7b7533a4b3f0f5545326d50e21cc
SHA109a43a09c9aa925cf69f53b6aa2481c414988bc1
SHA256a43ac917b662b7bf08801cd43534003f2200836f78dd03cb40448428236bdf4b
SHA5125b2db72fccc353fcbc7526680ce3d9fe0c12ce71a09ab842d048cf4a8be26ebdff93b68e8ed012f437c0c265d7a245d43a93ae58dee27a72c7288272fcd6dbd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfbf8360cd2669e93e092d9755b30f51
SHA10edbbfe8ee8e394e69163b26f36a584f213a807f
SHA25667440009bb02a264b319b2044bdbb6ebf43e22cbc2dd332eb8ada0b9c4b2372d
SHA512bfe944c1424525f5534df64b334f22df9b8010cca57b8e6020041ca07a1af84969b8bb6a4520e4f5a008d216618ccf78a7622e2f661143a38aef353be97cfede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aff2f05abf925c91c845ebb9bea33f0
SHA141cecb82742094abbee587abd67ada37b03ccb36
SHA25637acfb744b8add4e0d8787632492454c377b4221d732c1cadf357d040d2b3bdb
SHA51243411c719434035062f6061a5899f6eb9b7dbca089eeb2aa30a231ba4b1aa37c611239d2dbd0825746cc3dcb0c801f91e95ae10b254104f49d2c7a5fff404afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a482dc5241748b63f6acb7b32db57e1a
SHA13c2b2a219cf8e5be0631a9f975e0fd0198cc0e3f
SHA2560014c910c620998940c9c07fda52bfb2df7f6e66a9f05ec288edddc6fe69fba3
SHA5121c1b59d06fe0012c91140c55288a7ef649ea839f0794bfaae45f62613db5b5d5d2045bc6cd64abdee34973a8aeb84cb8760aaaf3f61589ee992c7c1e082dfa95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eac2eb5da2896d31d9696f57f4fa14f
SHA15facb469f6474eb8de47eaa35d9becf587219536
SHA2568d2c1bcb398c73d5aed09a01da53eed8676fc0178d0e0d7058acc4528dd75dba
SHA512a09ece46fdc1e26f18c8c47bd976a24c0b06847fd6e06799d9c4e097ae60f4d80a23fceb05b355e89b11e4f3041824b6c4a30243dec8064f8a06d23187daf9d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528787a2d44b19394dc1aba946c95bbc7
SHA19c326677534a5eeb6f3604e2ab18db407b4f8f30
SHA2568f7b186fa86d660f54260eee2fc739205dc64e2e66ec3d96f6cf2847ed0ad5fe
SHA5128c41e91c24812c40b739781046ef4dc6cc8c00317560eddf54cfe9043fb0dfe15015f80a4b61e724a43fee14248ab6c2a0a353aa3fa8fa8887094a311847a85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57adfe3d5b511854cc538ff7822e9a05a
SHA183f9e24f28b6d4d8cf17504284968376c9985267
SHA256e3c32a3c07feffd7c4ba02bd6f364a064a6182242fe891f4e6bc07452aefd025
SHA512a5426870c820982afe463e186551ad1b719b3482fac1eda878ac94984710b82194ead75d566b3dbdfbb576dba44888f7fc1178da4ec6f3b51373232256048518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be81fbcb44fd4c51dab787d1fa3b3d13
SHA17e485d693104e2ac5e6ab31e8228da815c5029fa
SHA256dfa9991107f7a20fadffdd32098fb93398eab4ebd333fa699e8ca1e6c8598398
SHA512dea23cfe3fcff33a41786c23e15967c05b1630dd881de4019895f33521017aaba6810b8255106c236e2e214bff7c62f5888afdc8c086636887e486873738554e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc26ed381326c7c5df98e7f21c0b58ca
SHA16c9857fd10948fabb424dd1d94b569a5baa8ec4a
SHA25630a196f91d0c9b5a4316e68da229445005d4f00f33179a68926c200d92efc5a4
SHA5129ff762f7a9051c232cb091f3314468ef130a796f5bbe7512c3326b48f3d096be7dc7a1c6a271d06f30e1fe321ba994e8f22f8bb699f100ba804264ed8b6b36a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f324fb16b2c951492b475c6cb6f56af
SHA19ac0e6ea7122577077c2802414e0b04451ec00c8
SHA256652c54fdfcf56c7a74de2eb1e30da04e0ae7ba97d1509c91393143e4fd727360
SHA512de67a8938d243c1ba83b0dfc078d1efe6f63688096b0a41951782b520b06ab27aeb9f885330c8f98086ba57aa2e77909338f58037adbd803619873fc30e1c449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd44aad736766c75cd759fac9561f5e2
SHA110f6bd0f8eb1140de12211c5214ebbe5d41738c2
SHA256ee1a7964c02bf0253bd88555c8ab5c4b18b5a105b298f113bd34d99bd7760561
SHA512236de77f2f6fd653a16b1e7995e65fd1da0fe12df44f5a7be5fd06098316b4e19b5b74eb601f4b272ef326036b9609e1c67e77887426b47818a2c050bff4003c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c4e11fc542104f516cc62d4191b527
SHA1dba466bf9ac567f74eca74d42e808333a26cdc3f
SHA2562c5dd77cacc0ed499d47049bb4006d456359afb5a0b1271a85fbd33f8f54c6cf
SHA5129e4cf5b4bb703c9801a5b36fef3a9809fb891868115fb90e18e3cbf16aafe725fde025d7c4c07c8631fb59e0b44d2403a78c8834509aecd6264e0a6e8b4bfbf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb49c3e450a62c0a4879578b7e5d230
SHA1db36eedc78ccf08c885be4591af2176630b3bfa8
SHA25657c86eb30a573617e696b8a32fbb081dc7859e7ec378945b2752f4914fcd4faf
SHA5121f3d3c7e6e231684fd8c0795f6191565bf96971a870d9237b669ec48832a2e27eea0a98cb45a8ed7d7a2f72805be7dea277a60926bc5917a3ad7fd30cfac2f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f9da48424e1a00cfcdee6d938c2089
SHA1c0a304e0f79f6d7a49734f1882423092d6f759a3
SHA2561d5fb01903e86f1693d962e11654815358e4b06f3410e3b0d47159d7297eaa48
SHA512b6a8161a155d5913eb9ee857ae7c1a93f00a79e709ce202102c102be4ac095a65b38b5a5f625d930fa1ac8f4725b057a5f9c3ce329ba37a7a05dec4324ae824f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5327d5cd64ff340b594a39945af9cab00
SHA1969ea144a4f94a3539921e84404364232c27cf99
SHA2563425282fb7d0b00e19476bee696fb047b5a0fe6a6a37c07ccb3f6878214a043e
SHA512634306de78b87f304dfbac1fe634933fdc4fc802fde0db3343b457c90c2d43761809f86902511511afa5da3c06c363487321d1b5dabfbb53e0c5fe01954e6de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27b5b68bd9f9fe69e80a5a30a6908c3
SHA1e3a2bf9f2903341f8656b47dc35296586db58360
SHA2569fe2f3e3d642c187f16572cb56b54d6efe005c80a769e246346ce4c858736b8c
SHA51213cc9b776eb8ca6e75184a81d288c149cbb1f99dee742db77008e1c406fd7f4fbfcef44ba9fb0a9d621c0657e4df009d3b12a77cea1712df5bfd141a1588e492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f4385af7b1ba8a06e68d43874814b4
SHA139ec2f50a0efecc0f5da4c1f5ca64e40aaff5681
SHA256beee288d1ec4136debd7189030e3ccebe146449e1a93381a936a57f7bfce0ad4
SHA5120f28d969141fd82d1d21b2c49a0c2580f78bb2a080523b86efd86dbd272de25e8767ce0ae8c52cd2c67aec2d7dc11386e22d9252210d4ec60df13a8a8ac6eeac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b