Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
eaab638c3152302c78dabbd810d71142_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaab638c3152302c78dabbd810d71142_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaab638c3152302c78dabbd810d71142_JaffaCakes118.html
-
Size
72KB
-
MD5
eaab638c3152302c78dabbd810d71142
-
SHA1
099a1d53fe99a13495fbea5289f472bd7c6815c1
-
SHA256
c9099784325ac7bd6b9c299d444a2dc86793e7859d54328cf6112d4f25d776f0
-
SHA512
bc66c435f2add63393d28b61e17b9a5de6bac6afd11e253e4e125f762847b7ce5be223125160cbb9feb0c6905f11f9c55f0494f9d35ac0d31040f3bcdf30a769
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sL6Lh5vL+hLoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J3gh8hETzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000040530150e58577ad340be45e4d7f9ac7a75a6cd3d76845f99fd45f344cf452c7000000000e8000000002000020000000804000644c72af0e4376f408ede46c038ab26c24bb867c2feb052812718d684c200000001c95035ab604c3ee6454c8b77c981f00c78c4d0530768f6809c2b375c9d5488840000000fbec54944365becc38d8d1b144140a77c5680e136a68e8116ca4e664fbfed935056168b3ab169c39aae84a38afcca5ad65dfa4bb252567bdf02f8c056d73d825 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103e63bd540adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E70C6ED1-7647-11EF-82CE-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885534" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2992 2976 iexplore.exe 30 PID 2976 wrote to memory of 2992 2976 iexplore.exe 30 PID 2976 wrote to memory of 2992 2976 iexplore.exe 30 PID 2976 wrote to memory of 2992 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaab638c3152302c78dabbd810d71142_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e2d8b3e690e97f655c09af68429efd6
SHA11eec7c8b34c02b332c54db90c0f687cd26784380
SHA256e3b7d20910bc2100abf2e75e4ed8260cd49bb0164215b89435a8cc7d628f55f0
SHA512f05a7e0ce9d65dc47174d6fd3946f783d2d9779a6036c56af499a62f62ed8be865b13f940c05a6d3b3dbc9ced153cd6ce93dd6c1b98b0233967ccc6453fe051e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f534aea0215d0682dcf7f589f604c71b
SHA1549d187fd554e0443f4fa6488b213ee34d497c08
SHA25613fb7afe153da7a2e3b6d1086db996b4b71bbb7881ae5b814729d3f148da8674
SHA5125eb86c8b3f6a78ec68230d906f640aa85f99515d57f62d9c42772222e5b277f29917098f644d0502e710520bf7b295a94ef42b2c41ae409dcdb7ff19419b01ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a05ae3b517ea6a24ef1e3be15f37cd
SHA1a7a852cfe55d928d15dd8235706e9f6831d42f1a
SHA2568fb33bb15579d1ea6ec4f4b5f6f28d8e0e64e977826d784810d3ff5be218254a
SHA5126295f2009dfd3258c0d1f187ed4738f271c7a55dd33b9e9b31b39ab62ebf5e29b0066b0be88ef275e435188d07cac6c905dd823f2a67d78d2cfbee33d0afe794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b99fc4fa9cdb716f3334830bae0e361
SHA178b1142114ffab2209834318ecfaff50bb50985b
SHA256f6d8fc67792bef181acc04c72075298f41862f93e449739659595cfc8d75d68b
SHA512be46625c8733b2056ff48f6081fdfc3a165dafa38def9419cd1c2d5054bc3c3e848a96b1810187576cdadd6130032be5ba3e9dd52438e69435940fdd1c3d4780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b1ba4b15b6bf2f275590d78b4a98c3
SHA1c1ca1e4a9bcebf8b545b8817cfe7f683173610d7
SHA256502e77b349407d0722ca4d42f6fe43d81d77685dd6228158cd6df9252c1fcc71
SHA5125bb89597d690612621c3979fd439955b3f01a62ca17af553e132e1a18ee884ccd7623d5530f78287141e2e2ddb94b6ef43ecb866c5c97cc939481b35aad9cdd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414e8f33319d1dcf13a5845bec3a0748
SHA1177aab884ac229a6d194ac93de5856c77d07ba50
SHA2568fed9420043cdc6810d482ce8be66d104b9b57fae1cc8f594588b772e8449ba4
SHA512cb633e4838d0f2556857ddedad17352fb3c78c26d45dc35458df5546aade5e750ec37d11f9d513775b720b07f4f01f952694c8761c6b8bc8aff07f12260727ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d7fdfd630f6545a881caeea70ad8f4
SHA19f48014fb3c0c7cb4c6abb3b5247d114cdd9a0dd
SHA25647141f59f436c409fbada92e31107c37766ad55627563810081c905f4aaf7d81
SHA5123532410661f28d276b0ac99db8b95675e29d20217864a7fc35d277ab570421683f6f44d74b9cdc1e4bb4e220f3bb28ba23ddf3e131875b3ec24096a247017b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c81982e986eb6237251a55099c352f9a
SHA1598ae0510c21d529e78a903fb2381ea2a7312bf0
SHA256b1a644f5352f1ce77cb1e51d675a94555bbd022c72e6e346b700adc0dec98640
SHA51234865c4ff8a4c678de52a2533c388c633211835f1be44b7b4d29dae37c4f17fd6041c1c3aee2c1caf828b67d0b97dba5d0af98629edaa58b373a7cc41405aea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a52fb4e72f15db56728de8e810e688
SHA1c1cbb7c1c5a43714d990c257d8da83ccc32684b0
SHA256955c258479c9121949fb1eef3146dfde0d97e56bec317808a0ce993c17997661
SHA5129ca58c9afe994c95be28e5f9249083dac34012a5f3f2c8d71aea0c218a565e9ed9ff34ffe74ef6b35c4061522c84591260611670f7cbc5316e2836e3e67179b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873a95101a69a1b0adda9cc8ebb33f0d
SHA1295d772c297b2a31dd53eda1a45c2e70bf75eff2
SHA2563126b511566a6df86e799457a74f90365ddd308480e961576824c348445dfb85
SHA5121bbc4a7ca5e92b904f2fe44a0524a17139930f14075572130366df7dc22e82cce2a53191dc4f6c15dda6b0c5fa76dd24752d0539b1deeca1b07adb129209d60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f238d93589d8bcf9a4ba62fc4d73f8d
SHA19d7b1e48ae77c1d2ac478ae1d0b5ea3fd2c6c290
SHA2561adc947f8adca814139b5958e75e6fd0f67031856fe896ba88e57ec3d752e208
SHA512601ad98cd329600aaa1e52f9069a14e3a1c58c5fd321d74b011a71e2fc91567ce0401ef8bae74bd2844ac10b800ee66201f0a42f38a9e0cd4b2dc1efb6fdfe20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cc8543152e2a9168fce948e08315ff
SHA1d2e3c3d60cdfd6f35aa622927c0de470e4e90dc6
SHA25629f4f94c96bbce297d714cdea87b705a281246663fb6ec8dd9aa4606602539c6
SHA5126dc2564dda6c54182ae613f332d96ff78599eed47f89bfff0852737d08a70f73e079fe73df78e0991469fe6f7accbd133a9ae01ced34905565c429f055e46b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e6f9360012ae5443b1cb49ae2377c0
SHA116dad00a8701fb099a78f6b53c583e06dac1001f
SHA25691b1859c8a2dc4e7d638657b73824fc9d3c16569fb176de74001f1838060dfd6
SHA512953605cd34d79669686c9189558881451b2752f7b07cf5505acdf0c4bb2b9c0ba5fcd38051679f16c1189751c91e88056ea960fd2cbb66ca6a7e3c9858995c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4a1320e1148f5aed1f0d169f71d9a2
SHA1ef07f3f6264bdb882d061a2091868752dd4b6f26
SHA256b775db623e8a5638fae118886686a0947aadcbf3f198cc390f5414d23a8497b8
SHA512f45b1af7b3f16cc6bcbbfada231c9dcd2c418207a9454a11daadabb003a588d8497337929baed89f0cb7f866fa8dfdc4718c4561c0b967ca3a24d101d26b4331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd32279fcfc50cb13a3e4f5212ef71a2
SHA18e9e1f848c8e59e533a50b417e4c0933e6952e5a
SHA256cec39fdcb910eb02f45ff57a3a13c308e4b66799d91af30101c547431d089e7c
SHA512470339b55e2819c7f3d91def50891ac3a824516af5920514c624b24fb4a4420267c60b63d64d6df14040b3d6ec51550dcf8dac3d4962e076677bdb80c0e7ae69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b6f396254b1e780d56d5ace63eb79c
SHA13936a2a96b3c263cf69b5cad7f88b53e29372428
SHA2569e933fe6a2b8afe084bce31fa23a8bd1445f11c556945cb1fe91bad4512175ee
SHA5123ee296acf4d0ab30eeb461dd40cd1f37992f6a46b81e22696b4edeb031514fc0713d5ff797b6cec0f8e54d47f52a065aa50b259b579ed4ed8af9e456b7d0ee18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ccacf50df7b8f03e471050361f711a0
SHA1e0250f630c0c9dad42411edd8b7db154298bc532
SHA2567ecbbc1bd09b497794d84c394697ea39c876de0b3fca6227bfe38129e6d5f585
SHA5127d69466159802eeabaed1b5aae5dd8d289492fe6b25f31bcb7b1800e9989bd20db6f19b0706f7cf7b087462b52e2f0737a376ca7f6fa3b0fef0e2c5799347cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b852673b047c310164f310350182a65b
SHA149240bdc6deef569b458d52b6b75997a6d328103
SHA25655adaf2f862b8bab60c037f4d127a2135d5b547f22ebab4ae281b58e0f651031
SHA5129d8ea09d242a1112bd4dc2a712def11d8727d77eaaae28e6d4e217143cc349795f19c4c52cde43864e3d7c815ad5581171bb0b4928a3e5e76de4c7c7bd35f9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f80cbc20b4ca2a9c9da2b5e00d27f26
SHA19a6b263a7b8a6d15c485fc649fb0d3f11665417c
SHA2565f054884f7b19949ae72fedbaf79aff8dc26885928954c0fe1d30e21c8b800ce
SHA512a5802fdc2984cb3c7793f7e6f53bc8ae060829612670f1cec20113be449ede31585d77614bc736a3ed573ba795b12b8549953db5bb8ed622371004f2b974b491
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b