Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
eaad58d06bce63b84c938373d20a7472_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaad58d06bce63b84c938373d20a7472_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaad58d06bce63b84c938373d20a7472_JaffaCakes118.html
-
Size
57KB
-
MD5
eaad58d06bce63b84c938373d20a7472
-
SHA1
7caf1eb9656657654e29dad0eab1b14e5ffca2ea
-
SHA256
bcd4d7ea5a7a8ae5577ec3a95c9c4274c19126aeafd0449994f01f3b51f9fe3c
-
SHA512
55ed7ba3bf91c0502e2aa6b72fe8215a5034d420ab6616496ccd4113f07e2413ec1f262d2da2a91882d9e772e94ece4190ad33515c324b75f9ede258eb8b15d3
-
SSDEEP
1536:w4OJu15kCTV5B42/NiRFCFmgfcwfWjrVW:w4OJuniR4FmgftOQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000041bdab79992fa30cd3f22f01557f3afe0285240fe8fecb2c7e0cd9cea8b6acfe000000000e80000000020000200000008fb2839c30a8256705ea5e149f0b40b4ae8bb2a8959d995c943d5afc1138450d20000000c3b24ba34e586584c961b42e518a3d29fc513bebd44b4defde1e0904f40fe71340000000cef8409b4424808288b7e9672251741e7d56eb20a0286e1611d9a847231e6ff7833d28c5dc6f73a326c229988872ba8377bc70995c9ef5016179ebb82336d582 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20701c49550adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{817472B1-7648-11EF-90A9-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885792" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2704 2068 iexplore.exe 30 PID 2068 wrote to memory of 2704 2068 iexplore.exe 30 PID 2068 wrote to memory of 2704 2068 iexplore.exe 30 PID 2068 wrote to memory of 2704 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaad58d06bce63b84c938373d20a7472_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea4bb24a231be13434433bbeda88e22
SHA1689788d1780b8bc4f2a79e986331c2c27c175d6e
SHA2561689ace073c672f13f3e628cc2bb8ad44599ef888328ef74d126db41fbca5ec4
SHA5129cb00fc449f91da7bab3cf21902737f6b28a1f52184be7cd49324df32eecf8faf4b235c9099bad40eabf29575cbada617f0ad82d748d78f2f9712a22fa4095a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2fd7e1a8752812f417fcb5ce1b69d4
SHA1d1cde86ce0415327af7110d58b6c9c8eeef422fb
SHA2561ddc8ac321d533e9c638abc4bc2f157e2dd5469fdb0b7573d329f922de32c332
SHA5122c152ac62c83dcd40218b92cae24e587a481d1ddb43f69e47e5124e0c0f546db2ea2a6584f1f4d4ab101716b2753534bf27d767245422644cc535015fec58826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c8266603d1f54db2a2b899c2a51e3b2
SHA1cac5c9c7745546e27f494b6ffcee93d2135c8fe1
SHA256d71341c5959cc00dbeda1c60f9a7980fc15192ebf2a3d73ed29fa58d3c495b5d
SHA512e202400f01032b8f61cce4239c58d0611c1cd18ab0513db5abd5418acc9d3f6ef4912b24eb2709664322af809202c12139e8ea219c5ee896dc9b1faa8fcbfd98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4fbf91a0f682b12ab90bc070e3ab005
SHA1bb1ab4ee6ae05c5d10c3719d043c43332dcc202f
SHA256ea38da16aa7b6b1332810a51ab272dd69befd721602677b1149983ebb32fe3fb
SHA512813e797b5d708073328f8c1d4b7f9ea0d72ff3a3899c55de67cf5d1d5de9e957f4a0da6ec98530055a135e42fc1bd41bbf4668d74a07589ce01808ded50133e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5013bc2551841aa0933655391e631a6bd
SHA126ad2c9bd6d867b4f9208a4b17983a3e50b7fc57
SHA25692d1767773de691d4160e4bb8809ff383956fac540db41bdbb82e593f360a4fa
SHA512579b9e16cd5e9a9ef4b7fc8ad871f4916a9a8156f52f0479d8143696525ea365ebcda056255555d63d1fffbf8b965f0d58862d12dd256e2a1d6215edd008c630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548dc5fd86d5b3c8de504865a61f79825
SHA10e55c1d5e0fe4681907c477511f8b5f75ecb1bd8
SHA256caf9c416295603b2981909d3d55c5def1251377c6ef5e2565208efdd5c45461a
SHA512ae14e80832e3059a6727c10c7b68559bc92bbe0321c5e957e55c230b56b781ad63a3c8aa19d918b668ba96b4633fc4a4ec7c30bd57d14377232fdc1a3485c586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5284cf40a1da3643392f02b2c33dfdb7c
SHA1017012d777789362e2f180d016e3e7e6af65506b
SHA25683778413c3bd34f79ef49ac816ecc2a06108893212e40f02c930097d72814b6c
SHA51265451acdf4cc31e595439504a37d1634ea7669f66532b52be05d5fd7d513eed357ebeb3fe41e96d29a3b4cfeb0333142ac50f4d810326ea642ffc8e336711411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5145b9d3197c9b28470ad332696cb4e3d
SHA1c798eb87ccebd1acebb72bb25036e6a6cfb5a22f
SHA256df290fb6f685a4b6f69fa2d194f2723a499a36e162b1198f013a9231150d4834
SHA512896ca729fffc08414e82ac162c3cf3d68181df847a3710dc27ce92e917859ca75e5db58b40de23dc36cc8f06ed78558ee99422a7fbdc7211c5b617c516954558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16b171cb9d04a27c6cbb752ca152107
SHA1fc6cfc73822b7c1d685926b87fdae849529f4c86
SHA2565d0c2edf4fd88cc93d2545362158f12b13ef74c7c51ec100c1aff34ee8059cca
SHA512a13bc36080425e7d6ef0b0d563f9c494b5c7f19d093bef4404af13fd88b428a98873c43b149a3b510e5d1e6551d21b9b3186bda46dc93b4c9280adee06709efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6199392a049ce5c0f7d34637e9f4a93
SHA16d928aa5e4129f953e17116569858c551ade5adb
SHA2561702426a6efe9f01a658535db0001c1b252372753a1c3eb486d0d9db64e941f6
SHA512996d734985d317b2fe67b5c6e012185a5cb5786ea0a794770145f3b29351982aa56811ba931a740f9b859e92029e8a054682d6b425295d0e6e7ddbfe0c841e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f9deaf8ae53f1554413870ace86a87
SHA1b75c55f4544357c8a03ac45a1a18771fbf0b6f15
SHA256133bd69bd2aea734b0f5c154d36be140694835d3e1522da42e7add9681472879
SHA5129f614701a6cc9770fb913675efcf411402838a464422ebace1f4edb5644ee10690597ce55d3e7f84efb04ed6971af1b9db438c8b9f4861d88261b3002f436c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfee2a40d45a85b7f25e897facff1dec
SHA17181c5b724aea957b0a0068866436fddf34f3be1
SHA256789a316beb8a62886e7befc9b36edc14b22425038a1b8cd87a4fd837ad58afca
SHA5129f96485f43892cbe7d96962688f965d93498fdc7e2105a13ba47bda9b673e1600c2f647e2db99ce3bd6ac17633b7aa482b55c8a9f74d7e4626133f662188c02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389b825b345ca2392a9547890f66d19d
SHA127ae16844ae34cbfaf54f28a926ccc85b2edc22b
SHA25620fef818b5ef2e672c4fd4ae4a03a174c93baa494cbdd85467276caa3e28098d
SHA512faa613df43a24b9dfdec2e919edb960978e448b7946aae819fdd59251a335faa4ebcac0b024185d63100a54b59e5da1702f7d36e30cb40a41dfb47a12a8c5f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a98bf1b6fada36f56cdbf74c11ad367b
SHA14046000e26af4776507f355bc21d4a98e99b2ff3
SHA25644c30ce2749b39304e80c779ab644954d8c9e81d27f8dad1504714a334488d45
SHA5125c3595fd2f0e0f7b0fca754124bb3f22badc8172786ac41d97cc9fac4dc5a46f95f38795d4a2fadaf89b533f4252d483fc1d6713faac0a05be12c3bdf732a2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d99badfc90a947d52fc6a59798fdd2
SHA1b694cb26351697bba7e09244e8f39726d54b28cd
SHA256699ebae003b79ecf7f7e2c3f3b13f9a61c9d903522ac37e226aa30dd290a5eda
SHA512db9102ba17c49130654cb9b1cb3d8dd0ca096566536ff381ac20fc9e47a18fffa65b868b8208a8c641e5955226385eabb0cee7494208fb7d322b3ed8f2bd5c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5940860be165d1a222d0a1f9cb8ec1875
SHA16f36d5f366bf599c51a191e636201f882269dd65
SHA256e63c6ee905b728fcc3f9ad3588a7d68e6009e13e5751864cdf94cb7b52c16e8c
SHA512ff74189c4584f38049fce42b6d02d05375fb2787c5002fd9c39632497bb2aa51431400445866a8d80c02386cd7a2a53623b236e202b8fb2006f51d9ad791d184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b33934154bdce58e6f4bb1704ec6ed
SHA10f2424f61999ddc70a786679c858322cbbe80c73
SHA256867df49dd12542f0f37e9e90c768f211ad3c6d5a0eec21f64bea26caa8df5d29
SHA512d88f573062be508b45c7f704e432117add5afdf451629e09c59c126e58d552eab22a28107ead6bf79bdffe88e9a66ea25061808d6381ae11fae06d1de60d8423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53931857ac0093f2e61369df2b5486230
SHA17c6b08eb9e841fcb49c53bbc002c8a8033a1b851
SHA256d096762bd95e87515e9f05494c09aa83f9e39e612d821a36f8bd314bf54d089e
SHA512dc473f666390720b648127d5a8ad78282b50bdc95fe6cfcc52efed3193824c7ec0616195d935a68c8c3a20744ff6a9173652b6cd506a3741a3d1f1298465f3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be72b711795d4dba97f92a9df4c7b428
SHA131c548b7183f390bb32bb02e180bbf5e6eb92d96
SHA256e5df67f0fdd88558ec1c71b13d131944b070943a839afabfabad6fe737c59895
SHA5120cc020aec66bf247a534bce824b5ea591523a52985d2b20757a1c2b616674dfadc3aec743ca04c049fb051fe03702e2925f6255084b1b50438f9b26a2aeaeae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc0779fb8dc5a4d52ec914a0cc0a695
SHA15b8a6b2e978ae4b0e6dfb3c389bd2a38f8e536e7
SHA256577363cee949f9db7cec7350291cf51f87c5a2e1342ae32fb2f09aa415283b37
SHA512f8f51b1d336a6f0817652678c57055aa186d4fb6705e765814ccc00d1eea3f433d420edfbfd90bf4d414b998e85d9504b7f2a8a796655493214393a7d9e64447
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b