Analysis
-
max time kernel
136s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
eaadd2099482e1b819d0a6fbda2d8ccd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaadd2099482e1b819d0a6fbda2d8ccd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaadd2099482e1b819d0a6fbda2d8ccd_JaffaCakes118.html
-
Size
2KB
-
MD5
eaadd2099482e1b819d0a6fbda2d8ccd
-
SHA1
693b710a0c189cf58f42f47a4565d5f7e4be505a
-
SHA256
145d0f445cdce11478098b20c75c98635fa380a853544821af2643a6ef91ec08
-
SHA512
bfc13b52d037b423fb24ee7f4be8879f544c13ee1958a001f197721a26d8fe2be5372932e4b6afd1335868932b75a99ea86d309f21e9a474849f3a5ba7edf564
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885882" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5C842D1-7648-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000003b382abdeeebb91bc046dbb7c11b1e6ccace7b2441271becd649d5bcd939048c000000000e80000000020000200000005e87879e4095e8ea715f5d1f7da8adc0561f7481b3c1fca8b6a3dd3b160ed80b20000000bf91c72d58f920ab4faafc61d3d395334dcac19110428f63c132f46f58937017400000007e6b60e03e37eab8e14f2cdc25a69dc53e56c9dbb004e27fa6bba47372f2891a01ec9f51f895877705b4dbeaf93829b2429c737fce3c4036f6e498cce501600e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02df88a550adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2748 2756 iexplore.exe 30 PID 2756 wrote to memory of 2748 2756 iexplore.exe 30 PID 2756 wrote to memory of 2748 2756 iexplore.exe 30 PID 2756 wrote to memory of 2748 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaadd2099482e1b819d0a6fbda2d8ccd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aed029aba67f96a49f06cf4f5c21545
SHA177bc65d853c655b737f9713d05dce6732d2be01d
SHA2562bdeace5a8147ac4b2ac1fb2bc81c87a7027f8355ad572f2f798fbb2e259a90d
SHA5128e6c3c35813723d282a04ff78a82e30ecdffd3e9f473bfe8e8ac8a9b437c76016e6f557e4e3d055a31ba2e2d9d1dbd4a9728031154769d31f4df520fd55d76bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8034afb80dab6a95691be010fc0cfea
SHA104011afe6df63a634e8b5961e19a417070ca0231
SHA256d8b8e74143b479445e7c0476cb3a983b749b3817d5372adbd1c7f0336a111b1b
SHA512da57a6b389ba2e189c5d0c0219f3d82bcb266d49f4f6bff128fe985b10fd0bccfc8f5a7abd5ae6edda16766129641b437a99101796af614298d5353ee6a642af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad37a72ee036ec904d7bef8d627b46d6
SHA1a2ac178672731c6c13d9daa5d64377724d319f15
SHA2568d0eb1a521b81a4b5373d968690170d942efd3e14fe99f649dc3b1d350e20625
SHA51263375c5da43f28d525d8600a1f87e0335bdd5e4f153eba92d7a24d83a746eedbf859dd27a0acbe77adecc2a6c8c468eaf47c4bc0e1953400ec3fe3d671e0ad58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfcc98e8c7de78ab7fe81bc5ba770f10
SHA1525eb0c81a4b22648074ee9b7192ca85ca342dae
SHA2562e94f7897ce8af4f74f11ef692fc1c33a2f526036cf835863585bf8662ae5f75
SHA5123c7c599f429037e9d15149967498265a04b98c3b5e52ea75f7b3020ae3ae900a19ba504bddb386c44da638b9c2276199ad2a1e8fe16183f55827ad9a7d0a7a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d555a34834d8d8b3fcbe8842b6e11975
SHA1acd6c909afd55f536c670493d9ce623895f01f0d
SHA256cc4545092799bae83a9636518fd58c475a7ee41f028521eb9dfd6a5f0273c859
SHA512b2390da215f6444e74ac47a0d27bbf1916c5a3296efcb15c31ca9a00e935d655c2bb04be1ae93dafdbad13bebc8ac13912d73995efbbadd1884c9b32f5aba7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d111d58a1c007d309c4fe1eb40dc7a
SHA1651b8479bf6e2759d52a908bb1477ff76a53c3a3
SHA256783cca76a79703c045ea9f8c5ff18ff927812e305aaf3a3c58413e5f70376dc9
SHA5125348ef71dc0dd5e2cd5a4733ca0912d157fd8bb9e98064b578c42bcc35802f4a5ad8e1eb56abb0d92b098f58bf5741b8e92c02c4610c8cdbedc05c4c3e5d3350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d4317eb5471d1dfd3d5275ab504405
SHA15d46daadfe681e406730af697f7f586d55c302ef
SHA256561629c2ad01c0465eae6d328a70fd6616891544c9fb21e95c4e810fdcce4b86
SHA51293595ca3402e7cd9ecacc49b721fe5db0c5762fc40d732fedfb76199000133d1e5e8018e1b77e1a647c22d7fd9f65e8893f5840a60aa3e627906faedb2213aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a171a4a4936e0f5d80f1a990048b7fa7
SHA1796dd21deda181638b57fdb708d96f36fb1704a1
SHA25682a13733f73e18a26d094febbf2c751d629a8798404d8441a6a145f72f70e6d9
SHA51241cdca95b85a0cbbe516aca64ed0c28df7de252c12c9bf381d4d8309b2fb9c4a9a025fa8519174ae337182ea7460ddb5de6c6aaf2603171d1f88b01bdbc2597f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffac640b8c0e5f265eb17dbd6a550c31
SHA1e44cce6d13976e0b5f8499f3d25b98c0ebb41fe3
SHA256e7a4c28f3ed72de12e7d7f6c1e6ff1563e2b6c77d02ef6b6c9634ef97790bc82
SHA512fa9097dbad863471e987c0fb91b7a23fd69803901592ab3f75b82894951f019379d3fbb8f9d7245398af7d01d3cb1e8f22b69f6bc4214dd7b17ea1427d5c7a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513200031a3aa6b4b6e65a750ac0f8637
SHA102d8d145b6a982f0574f0fcef8222b34da0eff64
SHA25650b76c2e4bed2b4bef3d61e35db894671dc1255a14ed406bed9865a54b2366c6
SHA512e7c5ef1047af72c7f5af3505af427ce9cb6e31049e84d2a366961381d36e0ff85b8f28604dc7c86eaea20a86a0bc08e89d22de67be70ec5bafeb291569e2654d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2ad5a2319cde90740200b768f3d4c9
SHA1ada1276f95505c51a261f15af019e2218fda5a0e
SHA256bc9aafb6353b1120ee105a473dfeb4f8fad51a9942e954394d0a392375042b78
SHA512e2c9bfa5a307c8cc7d3aea955beeb013cada1233c6df6409d3386118a848ada5d077d97cde505b1b0bb5aae780f759cdf731c03baffa44a86c43565fa6c8a789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc94a075c1a0698f0e0f06d12a728c2
SHA1123a250a6dfe34ba5b9732be46e90b87b6bfd377
SHA256a58b50a683952ccd537a2a9e52b93beb5675ba514302c9026ae2423c62ee33fc
SHA5123d873dafd696ea67219d30cfa4a458d0a94039e2da629d8728893e478f49595459093b90d8d50837902dbeb8b7878fcec3d4cd9d95004f5c5f2129b8bdccbf9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea60e37c2dbebefd19e23f6f4cbc0e7
SHA1ff3ba9a5c3421f39fd81e08e3011fa95b95157e9
SHA256e466ca0b2701de02a04f94e7123cbcdac7dbba34e5fd5c3b234fb987f3fccfa6
SHA5126bdd5c50386ec068d9233a1fc082aae6eda1fe857064759d427e7cdf05fd094d17d3e0a4221788ab0e4a4232d3d2bdb180e15957e8fdb9deb29d299d604f20e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b49bdad0d01ecda3ed143336261d98
SHA11e1c3b2e8ec022af526fe788fde0b607e2d157d1
SHA25648ba86be7e0b3fe81b2deaf8f23b2c915e35b9f9d34989367994e019064dc300
SHA5127654484c5aa4992f834315bd6e3abecb7662be5ec07118f349a3bbadf5e9a062673458b86771d478fcc058825194f991e02c8dbbab75f176dc0c9a89896caee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511aabe0ef99868b75c523c62eb148d37
SHA16ad8063c1f8bdc9f84dca153189611b96653af2e
SHA25643ddcb8965059a3c0341816bf5a0b147fb47d44e17e5f97f790060a59c636089
SHA5128420e0750a59a8aa72ab8910b8e3ec726788476cca2242502748f3816277351cf7a5be918a2e9201fc7c44f3c0fc5f9bbc6720a83f49ca864f2847ae6700ffda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acde22f6ea87aac6f02be9149bd4afa0
SHA14d846c462d74600a3ed118639a918343530935ed
SHA25610b86810fe13a04acf0d35148354a0d02dba858f9ac3570820ef29ce58e7504f
SHA5129e2fc7c53ea596b34bdbe8836770f247980252fea1b451b8020d58349d7acf63439f70bb1af0bbd40fecb9e43be53bf9fc06e173fc201b83b5a94dfaa5503b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59479972ce2e98d4d3945fa56baa66331
SHA1ffa938f31bbde4b0ac0b74934daa6ab909348176
SHA25641f495bd23c20357a8f97aeff41f9d20db3b3701f6b7d70bebb246b170aa841f
SHA512a994c51307fa4769eb6bd5325fb41e91c540b326f046070e81141c1f5defb291223eba0b13f105a792dde07a41652048e1bf93bb3edc8e73ce1064635c4165c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556229c9b7c462554bb0ed6ed47315c26
SHA112f948bf792297e0f055e0c7be1c671fd7b3b9ec
SHA256e44f24db789e6716d1cff7678f19c4e68504e8a6c96d9a99674c568eb1bb513d
SHA5124eb635431e0950913a8f886d5e28e93c847c776ac46b41643e443e4b5342ecfc538afd77d208a8f30425711521f5e7a8c01a422bf7e988c912131652294aef96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c63ea2fcfd1adf47991dfcebec5555
SHA1e2d9a6ebac6f085d1f4db7bdfadf3a2ce676c2ed
SHA2566847c17c4810b8ffaedfab762dfa1cbeffd9de2f68f0371dee34b72937d5846b
SHA5121a9a1834c2e1aed0e7f1702ef5347f4d9160f22751ad762062622a679c0030c3561e8db1cd405b7951b2af8bee61032cd779f57a4a53ba3132f59143c9e2b19a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b