Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
ec0462d0d6d9ba4fee2368d41fd3e597_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec0462d0d6d9ba4fee2368d41fd3e597_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ec0462d0d6d9ba4fee2368d41fd3e597_JaffaCakes118.html
-
Size
24KB
-
MD5
ec0462d0d6d9ba4fee2368d41fd3e597
-
SHA1
5f062140d3c9e54e5c1750aae343f77070d9826d
-
SHA256
28d9fbf085822742da7f596f837bae4dce196aaeefda4216dcd045c81c8f206f
-
SHA512
b436fd19ef8f5349d4be17ffe5089464dce1292b3bda7ae57d39e66dee0fe1caee82cd6bf0ae6e2dfae8a37faf4ea48ef2c20bafee3ede60ab863d10583e516d
-
SSDEEP
768:2roS7NEAEQRrfeZV/eL02YVvhSRSuyXFlerUrEJvhSRSjYoB55R3LDWekDIUUgaT:FGNVEQRrfeZV/eL0pvS7y1l4zSkYoB5R
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0243589c80adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{989CC6E1-76BB-11EF-AA9E-527E38F5B48B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432935223" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000232ca4eb18fb72f0cd91974e0470460c249431cedc606e46237d82fdae2a8d62000000000e800000000200002000000033e010afb19895592e05003c1de829dd919971a5e88aca470aebccc1761be83420000000ef00a23deb850ea235c41a41ec8f8f3ca4b51381b320e6292e216c04fe028f8d40000000ac9e5813d4c775053948ef1e4321e383f67420cf04317c676e7adfb365142068af7998bcfe42b2cb6be1d88f4e6d2fef3521360bc3e87d5153e5458eefff7a80 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2740 2648 iexplore.exe 30 PID 2648 wrote to memory of 2740 2648 iexplore.exe 30 PID 2648 wrote to memory of 2740 2648 iexplore.exe 30 PID 2648 wrote to memory of 2740 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ec0462d0d6d9ba4fee2368d41fd3e597_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ea4b7b498fcdadfb0f8735a863859bf
SHA1ba74a354da6924b5aee1b1639536cd7fc6e79659
SHA25689a40a5a5756a0d42dcc60495a578e359c14424ae2047feaa83f4e7d848be59d
SHA5122ac57a03b137e36865c8f0e8ffa5890a3d5105efdb79d1911b218691a8d5ace23b46a152c47bab81e737585e39ad5b1efeb948774bf414a4d6ebbe094cf067db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d08918eccf3addf6823b330e852d062
SHA159bffb1fdf7bd01d571574f2702001f7daff273c
SHA2567e008030c5b4982d5191a70c0509b1c9584e290595c848d9c38abda19a1ef4db
SHA5121b517878f849720d71ecb497a58a211e21f8ef7a1ce6f3aa5bdf31ee65d53a983feca9471d243c96767a0ecad7ffcfd922c3a3cb0faccaa1d6437d64e196aeaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550733e180f64bd54761d7eabc70a3a7d
SHA190cc79cb1b9b9afbb764b08878fa5f8e71a55f91
SHA256677d6bcf0a60ad1ee039ce7414390ec1d67c69d25a3089ce1ce4f160895f9817
SHA5124fc0b637a7cdca1d81ef393063a3d7a879b97efaf5b98214b20ece095a0b82615277714995eb519f00bedd518a62903c3622709ffa99b14881733acdf5033e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d6662161c47e966ff49e6773eb6d93
SHA1df40e6efe0906c7f6c702b3f35e19a1979a4c7e3
SHA256112ea2cb5150366c17f8b4b47ac3051be9d98b339de4c107f5be08aead5dd0f6
SHA512cf5d1740e74df611b392bdf535144bed5acf4846192e4c1ec2d7e01c77aaa6367a166796c98f686c11863f68141e15b8be2d0f9736130155700915d1346e9fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae675e83a3a48b8892028c525d71c08
SHA1df856ec46e823090451e15640f1d2a5a2492c551
SHA2569369c82cf32588402a3680295b2996d178b37f084afe4e47169ad2931576daa3
SHA5121df1d31740f11b72d8bc6c6c65c7f9bae14d2c36d076450e2de297547b340b68ef6cf7f3de77111b31f6bde4a80721f12130fba9ee038d81009da5f4afdd6dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bed58c85f45ae952ee1e81d31aad934
SHA1dd538588f27d324fa9de72a83514a47327968582
SHA256385930fb89df910b80c86d4f98742eb6ad92e5e5dc315726e1f27610d0943ded
SHA5123835b2f8984c2e5c36765cb2636f6b0e1bb666306c3ad59d8fb81b18b5369c80673276a4e2db1a73739e6ac41b3440b6bf58ca77aa63278bfb48f382737bacb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51f95f4137bb8a98b435f2bc33eec9c
SHA13abf1336a2e8d8bb6fdb5f2ab19531629adabc9d
SHA25687e6156819128661df91f4547ab0e75fb2df166e621214ca61bae0af5aa151a0
SHA512aac25bec02469a1004083e222a4ac0520145703dcfc10e72b7dcbeb20152d39164d37a668186bff70bd9886e7f3fb1a7a0b676793fe5c168f15a84a0fc326a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edfd53b3f3767c704bcefa8e3e85b2a5
SHA1bcc5203ed6cf014883dadf4923db1f33f67c8874
SHA25672d443cf4fb9b5413945ee6aa710e44239d8e3ae671bd1fee0a843d442143097
SHA512c1747fdb1f56e35e81c1ee25f2c416621ea2be112c4a7ba416967b3a4f575645c0b11ff5117db3d29a99d5df81d89f592a6c9f0d77c02e1cc3fb1d488b4fa2ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33ba4943fd52e693e3e55e5cd4107fc
SHA1311b0352400e401cc7879b47481f1dc8fba59e8f
SHA2568160cee3ab9db70a3fa0ad3f0a9ae57482e4db1d7b55349d816111f5229a592e
SHA512f584a951e7751265c4846e8b8d7ec68c2919380a1f3af929257fb8a3c7580da89d2643e4f6ce3eaafee0a8bb0cafefab1ff18069e7e3b5e958671f6e2addaa8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5751ee6248ce29d181584383a18e40454
SHA101ee508143bc1db64529dea11002962c6d2dc4f6
SHA256a526653fead1282337f055ee138b7c4d146db9676b223534b0ba6773aa25e4f8
SHA51290f889719c3c8149d69350758c7174293c15ca18b5e3d0e1aceec3523dcd1c968ce9c80d665382783cf7bf79b32b2ea74745f89f7cb44b7b9c0799d783ec0872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc330c13141cf3a0c968c0f7d89d1328
SHA1c444a1eb8f4d10c238e5c576a80bf0ef595b6107
SHA25658ffea4d92c8236d59df9d043933a76d80b40b677172b3dd24e14f6c0f62fd8b
SHA51254223011adf0eeafa49ddf82a600e5f3ba5c8711975cc5f2f458dd526fff0adf601ed47a285a73bb4b7715b3d9ed546160c36370202c78e8454b06461ea5917c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffdde880edb146fa038811dfac122966
SHA11ced52ad08fc4f97d364d6cba1bc9072e28f913d
SHA256b2109a0a62ef1520afcb431c31074dbb2e566322a754b065f03c4e2409a72cda
SHA512bc5315f4a107730433201901ea484b9d4bc1c8b0e742f9fd2d2c923d41daed8c404e9d8ad0137280757b8a922278ad4990805ec25bed919017085ea5b01bfa4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d2d66942e4f0995a1605acf55914084
SHA10db84e8ea168051c1a86112865990cd1581feeb1
SHA25699f8b9429c73836c8ad64ed688a7a6627bd102341978263fa2e99c56852d75b3
SHA5129f46b41a922a9a584c5bff158eb881afb431c00ef0da06072bc4a3b6b4b1c55aa3e2a5b8f7efaa16f6cb1beca23d9b0fb5ef06e1309059c72e25485dced0424e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ef8536012492efd45275c587d81efe
SHA14f845e644e24e45b34cfe85996c5413fdfe4db79
SHA25615831063a8c7283d2e9f91fa19f0f323167e317d1c457e985b4a356c2a7cd2cb
SHA5128c3075823811ceeee5d6effb00181d4033d0b2601a63b71c19436840df1a6d44bc056a9bcc667c62c901418eb31992a88ad9f487b6559a54bd6916682987cf15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4e60aac9bd87485d82a000885a0446
SHA16b89ac8ad230dc0a6ecb542631f21079a1eb1b2f
SHA25642ae4661594363b7304cee7ff5ad1042b3861f78a0e4b827d127c2837ca44c05
SHA51236f30d9b3c9fb3e0227803f2e66af4989d6b2ceac62ad3a81d997c6a2d44033b482df69a63656ec29c09a9f710d60ff35d5846586c9549c334619cc9f640fddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6228260551efcb48c7c7c67913ad4c
SHA1c35ecd1e35d350a8ecf8eaa4078d00f8b4b25413
SHA2568e5c4feff26984d9219d277a64b80be113d77dba23cee24f04db43d8364b9561
SHA512dcbc4e1066c5d417a48ca719b4f2f229d7cfc2293d7fac7f07251c65b6ee504acbfd227e867d4d4562d3993db268f82ceb91d2b2bbc92aaabe9221302fe9647a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9d3ddae224aaed8ec916b6c7392fd0
SHA1507fc608ccbf886fac6aa1186ded2fc2f55adb47
SHA2567053ef37d2827c66b2425f2f7dfa47eb839f94cecf9698c295ac80a27b44d0c9
SHA512b4a60406d579748efaa11ece5b2c2a9977c66a985defb697543e40bf922cb0b243da705564af0bb169179de8cfa477202c3a229a505dd23683485d1b5c8444f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db24fb48adc4fdb8de156fc68e99181
SHA125bee38b59aa68a826da036f84ff0fc91ad158b3
SHA25663dd064379756c373b46787f271c92eff3233eab1042bf92ef913efbd822dba0
SHA512550070d8053bd96fc3ea27781b99c0084683f46fd3e8f9d09ec10f5ec97d5cb42e6d1acae79e6b46b7469abedcc9888253a652ebe90403fd4b28be1221e1ba5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57faa08482a473838bb0d81313abe40a8
SHA1ab6395f4e41a2f3206a0ade05ce67359adf89711
SHA25683df0a77cd73d404b2540f9e75818d63e9a538cfa17fe547f8203c93b40d12bb
SHA512264d522bb0a6076ebe00c709ef0f6a2772ab19382e70250e1a8d7c83b9c8042556936acd6faf5cccadfac1421746060ef9e9b52d76074e2e6b99f1723ae529da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b