Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
eaaa8f327e203c9ac7d4538e53ec0479_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaa8f327e203c9ac7d4538e53ec0479_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaaa8f327e203c9ac7d4538e53ec0479_JaffaCakes118.html
-
Size
68KB
-
MD5
eaaa8f327e203c9ac7d4538e53ec0479
-
SHA1
b7a83af2fc28f7bb5283a119bfd5047ac3920a21
-
SHA256
29465a360efcf0dd450cf1aca29ef443fd849fbfe5e672672c58091ad60ba1a8
-
SHA512
7acbbe41b6d3ca5021ecb6e4f05b4da484a1419c253973d6272f0d06253243004ac3d656b0be2c8b976c623b3edf6746ffdccddeb7fad3f5d7e5756a26228881
-
SSDEEP
768:JikgcMiR3sI2PDDnX0g6yEzjoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8s/k:JspTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905c0d6b540adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94D0D3E1-7647-11EF-BF61-EAF933E40231} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885395" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000094c56dec09c0fd528548979c90cd1dabe80609f88b9609edfe80717a4b2a29a2000000000e8000000002000020000000bcfed858a2c471482e0933f86816e34cc39c7354ce15f3e3d3c8d92534009c5120000000cc9c0d2fc7da664301d7dacc831a328bcd147091d626d394c108b23846f8c336400000003545a26211a24ac2f12f08413708ba6c01dd70a85106c5e1209734bad961d6d23669380ebfc09bf34fd141a0c52157b7535063c6a42efcb38d8f5a8dd73bda70 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2916 2236 iexplore.exe 31 PID 2236 wrote to memory of 2916 2236 iexplore.exe 31 PID 2236 wrote to memory of 2916 2236 iexplore.exe 31 PID 2236 wrote to memory of 2916 2236 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaaa8f327e203c9ac7d4538e53ec0479_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d55c354740461ee40f8ad3026aab052
SHA12785a3b49dc4a9e536a504582675c20ebe33cff4
SHA256f1dbd15dca8a285e79192b89df547e662f24548677ad7ae14ab075d48cb35bf1
SHA5126ee301492eceee630bd499a6fbe4516195c51db77acf56400b3db32f06f12656bb7c16a60064916df7e79c7cacaf91ab2b7e3dc756cb572930dac5c92ea124b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a4f044479415c7c1d2d066ab344ef1
SHA19048c4b98627aaf30b6e7d0dcf536153d0bf3dcd
SHA2569c6143d3c2620446b10b08886e443141887e2792f17ceadd0931e7fa78ada5df
SHA5128701f7c3268b38a0d1d0a5c625482d9dc26a4284ece30f318a10e653e79a376802f26b39e6c5bcf0046cc97bccfd6ccc92dfc881a49cc0efc07e4f2295e443b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c700b7d5c3a3a2dd1dcc58da8b4f50
SHA12ba26d86ac3c5e95711a74fd13dc26f3c8fa6a64
SHA25698dea8b2b33e71547f06a148414f36e147c93f296a8c9e80c32a4ffd29a6d43e
SHA5124a6ab5eeda728a68dec7486ae847ff321a23db1a49ad454722a1e5468ea68ab565a11b28830a65a60a093679d06e9346c14340490e8fcfcf0c99667d8edca363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6cfeea941d04928d2c2df805a64bed7
SHA1e8233aa368593fae47df4caafc97a0a5cb4ebabf
SHA25630799b6e780adf016a91a6207e067bf725af1160473c9027e0acba6bd2b781db
SHA5128d860f6bef10745352421046f0a4e32038ce66ef80293312a4be605949e898ddd9ee6a97a8c09ae7cca477c061ac02856c16f6c8ae2878cb8bede7b5758d01ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f25ae5ceb54318fa1f82345ee77ed45
SHA1db556f4a055f00019c455c69751f41114fc1d59a
SHA25652e30745dbaacee8eef73b7e0ab8b5d9c8009d0534e0d9696efc031e550a70ec
SHA5124eb7981f220869b4301f3fe3eedacb788209e81140e425d32ee0a507b2b4a7d7a0924be86925d3441ce3d1b0ee96924e21980b381176e5712af38164171dd545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50005f203dbc00adeb2b60dce400c0325
SHA172ccdf5a1f34e016e88035c89eede9a6b47a48a8
SHA256411abe205430512d9e8bc63afb3b9dd4da1e2bfafe470886aed997da77c500f6
SHA5128a65d9cecef82fe1c809e9d8a8688b8ee19ce39d4ed671cecd4b09eb7a8752c7fc35d87b05da27bbec452ab13fbe596d84ce9f0cfeb690b1bb5adda6509c8669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3017adb4385804590e8a6a35719bc8
SHA13abbc9d1f7ee78637f9c0f1df5ae0a53f10024fa
SHA256a4d65440d1b8b295022343535f91e8d5a4bb36deb943350fc912662bd414b5b5
SHA512b666fe62cff4ed8dcbc7091eecbc096b30267309b7c09aa26b2d59941ed4efa3dc3af152c935d3cd1c22ad45171ee856c7e1adb433d99c2a8cc74b3fb3a6f424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f8762da02c6ed5a873c86e0d35b9eef
SHA11778b341268888ba43c3f7189927e8e77f839be2
SHA256b7d919c10ec8c31e9030fccce71faace0e0a477d3b6c09a1c55b07b37fa6122d
SHA512b5feea4f714196038d5415af4b75bd9a037f97de4e124c32bb02128ff6fb0214941f81edd29befa568604c30270982317404027cbad858d4da7d7c9cb876fcb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913243c729f06178b71f0cac785d7f76
SHA1033d2e417e896ec182766ea17f2e0c654408521e
SHA256208e15d9e20ac9c35f38b0b26261a883601d1d49eb253c39be7f00711f1f9f98
SHA512ca35c5ba18427de4bd470ce3e0aea27663b25854740352a03a4bb6949e37f87a5df884af53c4ea357ad3f8898104dc32136cb2ea434bc385de8e7358da86f5b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab3ecf9f1739d9d3cd6d00031e8ba7b
SHA1f95c2ea27006b95326af607cfec688d923953b4f
SHA256201643e3bfb3d047024262b671bea2b0e06d67b914aa7f8b64613a58584c4289
SHA5125489f003dbcbc2ed713083180ec3c294751e6aceaea245e4d631eb3761132589fd2252bd6c080261af625a934e1c9757cfb7b68b797391f00812c0657b80212b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf46b465efde59b1a6ad40e1d694324
SHA1e2d4d65141068d8487bf9f355c1bf62a2491162c
SHA256b9e19d3ae3159001a70746137022fec3e67561f6e91e0270fa07c426bf012794
SHA5120b8c1991ab60af2b7a6009f103f751cc02a4a0c4d91e597fad583ddd1984aa75c96b840a11ac271d30cd10c1ea7490c72613ff8d7c207eac805b001de5c56698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56266c67c973e181160399bf1b919e2d7
SHA1c2c2d806439186e5657f11634c04bb30dbddef34
SHA256160900f77ce4c125279945d638a5f008de5f72e9f84b3e2785f97f8d17fa2db7
SHA5120cbbe5a53f7cbc3a42ef31e8de80d59d5ebd73a953bb3df614ffdcde4a539f45b2d1c8e84026d7bf7843436f003f3014aedfa3c12aebdb3c7ef54dad9a8c3fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb570e77cb3182da5fd4abc0b6fa00db
SHA147477cd75525755a5e0810c9574bdf2d06031328
SHA2561608ede9d60a04d39a57cc43c37ff35acc71f11c7feecf412fb25620086a4b7a
SHA512f36f67f04bc1c09099b6a6b562e40ed80877993df022e9280756c13044129e6d76a7776f5adb1b845c1b1e6364de8d07abe766590257ec96333327ae89de0439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a21cf1f9c25588d1815c9113d876ded3
SHA10c1ae616863eaeef20130cbb991afc4a73ea4a25
SHA256090b81555f09e88cc83e88a594633c6097da27503d4fc1c584ae645325dac38b
SHA5126207128bfbb80e52787a2494b16aba42a377e39bf450c4757ad715d04ec0f46a4531a3d90ede98571fdf818271c848a65a765eb28b067b1611b8502e7a18d994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0dc785cfa83cf0f72d6c3bb721b5b7
SHA193998d3b254256fd20183687a3c19fe751acf5db
SHA256f15b03012651ed65f776bee444454296a408dec0aafbfc9ec0d704913219d816
SHA5122177a02f80df4377afea6536bad7146e0da4a4ca29ec572af31de9301bff0438fcba3d2abb8fa63486957dcd749ca722a4614ad5b2449020d37687ca6438672d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd9e6537f47131a532ec5147fd560ca
SHA1a51daf0fa9fe5fddb2c6737fb048d6cfcb942cae
SHA256ce66d12c38060fdd95180d7b5470fceab3f77077581cea65904db52636abf754
SHA512e5928750de02c62131f6ab3ead4944c3b83f3444972092903e8c6af49c155014914b133b95f35b2069161a160f82c1b39ea15151dda662b296784f895c066304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5df9d5209f6fc0cfab36c7681dec4fe
SHA1310c963974db9ec69879836ed49b79c38ae4f99f
SHA256ac0407f3ed0a9a23cf7b3a767a7d1c66b25c39f01b67dd1e4a858b93f35ccf6f
SHA512fd9507f80d3a19a7b1385c2a771c53cdc02baa61be902abce43e777fe4a3e8c16b88f686c85b866d6722e4b7795a1a53936dbe807bbdc0984bf1115fe28d1956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871123ea9574550e60d782015f940e9e
SHA1b5df56559f04e3d3e9497c32eced39fd56d2b094
SHA2560d73e2d1a2ad1388a7d3a0a85081309f8733a8ffaf4b30af9ae8cc58b61005b4
SHA512ad48a748315e39a832f4d104ca85ea30f073a31f73a66ceaa80b8af3e5ae1af486d2b47c69c818376f477fed80a4b7019aa8a87f9380cd1d4130e6faf3271ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e959b17722f801771af2b515d22bce3
SHA1a6021c065239f89df71915d702de862224b23f74
SHA2567d0530c69bcdca9f2bd199887fb4b2284b4c997b47a3a4139b30eb8bc52efd9d
SHA5124b8adba6a0d54a98ad62a75b6535fe60618126b57122e7ec9a89e623759db411d77ae8962f54a3468e954761e3e5c7980131dc73bf38f80717c8edf69c866de1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b