Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
eaad6a65cbb76b5f7e9340c5aaf17721_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eaad6a65cbb76b5f7e9340c5aaf17721_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaad6a65cbb76b5f7e9340c5aaf17721_JaffaCakes118.html
-
Size
2KB
-
MD5
eaad6a65cbb76b5f7e9340c5aaf17721
-
SHA1
994988f66667f9ee134a3e0359412beb48fb5d0a
-
SHA256
069004d4ca53f1851216329f41efd166aa73f0dffc0b346d972fc4fe65eed5f6
-
SHA512
4ba614c7a8eea5428baf8d0c353a82d59419a7d2be36ffc17545d60e6fe1cde552a42445598177be3fcdcb52ff9d2b6d89d27ee74869f3f80b6e1d86d366dbb1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8639B351-7648-11EF-8920-7AF2B84EB3D8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000bc051bdd4f95213d95da07a02661d265d0e7637fdf81a5e226f4b18d6583abe5000000000e8000000002000020000000ac9f5ea7d5a11211a7bb2b7f504d9c5e0d306327ce47e06dd00d7b86755eae4e20000000d19204c0360fa2290a627502f1c06862ed62c8e972c0c827e98da371a801dd8f40000000a67fa60f4e604a264f79c7fc6f7f768cda9ac310e14437c715a5a2f739f4a2b9667b6140cad35c3022de142748f369e722464c2f5c4bb60c84372452206d3a2a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d046c05a550adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885801" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1932 iexplore.exe 1932 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2396 1932 iexplore.exe 30 PID 1932 wrote to memory of 2396 1932 iexplore.exe 30 PID 1932 wrote to memory of 2396 1932 iexplore.exe 30 PID 1932 wrote to memory of 2396 1932 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaad6a65cbb76b5f7e9340c5aaf17721_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52938370d7751c0a699f6a0e646efb12b
SHA1e7f043c8169a417ed7f15f8b26fee979dcb6cc3a
SHA256f96436f4e0a88200c300085051c8b36d5942d7f2759d6cd2751f8c7fcaf7f007
SHA5123cfdba6f1f5c05c8dc439cd0358e1945bde6546a5dca28f2415256f1f7c37792e7bfba1b53a792794188de61bf1b64616169f5ac32efa1e8011a8def1b39cec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3fc973be738e928759f6cf30aa32f4
SHA15e36429b177cd21c493f439c4b20e88b609e848c
SHA25630a73d925b03c016a7e44e311cd2bb4a17e8b0cbca880222a63e30e4a61c3dc2
SHA5128264179374655e7ff854219245d424a5e73ef9da4d040b7913e377c20c1d43d0e3f0b6f2031c7410d52cbcc30fea4ac5203ef613873177d4fc1b24f0efcd1bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e339dc9f8af6273e24fa8d9cdcccecb7
SHA1e553a476924ef0201716fbd9c27d1407addfdcd0
SHA256a7970a49394523b9e0316037e003f34a2c518fbb5a2f4c07870d171ac6e02689
SHA512ec3ccd6de7aca468fe8dcc106b28e1f0727c8827fff9df57bfb3a0eb12c6bd3fb07c36ad2c049c836ac7ba5e3d674a728d20297c4ba2a93fb45c0f647edf9ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a79d8537fc7df6c030768dd9441340b
SHA1b3fb31b04e7ed4db2b2c9a01b5eb9ae61602a7c2
SHA25646d0e9550d3efd6f3fd822b521dfbff8579ff88e4d6dfa96fa21d1928f0849f9
SHA512d6511210dc3cc33dc48e9c6b97794c71f8bd4658a6b5b889e31daf567479fc7c648872c4e4b308fc0b25b299177de017076a5b8a62baafa0b4b0ead87031df99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd335f9d9ddbc2a6b48389918940200
SHA1e816bfcb6b758b75ca983809218daecea6445248
SHA256ed8cbd09140e76623eb9dd446b368b235bb97586b47f2b80820bd2307933c4f4
SHA51250d0ef4e073c6432e63fc65d20f1981c3b752a0ff1f5c8749ea86d889d7f806a25cceb645c34a582becf995c2364de90cc1b2773e25585fa683989fb0b3ce950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab6fec3b7f491371a9a1beb1e72a984
SHA180c6080077cc4f248d94be2507ed4213ef1c7edf
SHA256d58323caa5d5f9862250d905e7f6cc7407b3b2169c2527cbe66923f960870f70
SHA5122a21563454bac61caed4d33756385cbd33ab4fe640172bb970598d7ec42ddf305e79d31e7bd369a034a0783d14b0f2cf8540ff4c637bdc35461715d0a7a1917b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59812ab5d26d472c877869294a49f5768
SHA1ef5e0b44fbd98494bb1a98db6a23b9aa3adaadcc
SHA256a4432589cf72efdfc0dc208427c890a9f6bcae16343ceb6e25cef5285189bc6f
SHA512aeec50147e27e38703db0c0f9c8ddf9c2d939b6a34cdcf042051d4da53a79f16536b7322bb76321ef92da8c9e0a78075126a7a17929a8e571e048482a5980f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647add8360563229882b60108cb30f53
SHA1bcb45a12dfa165ae383702bf9b6e1c2ddf034d67
SHA2565e51eced3d3da99697255343e1f719b0d2dcf8704ab2597ad077a111c2aad80b
SHA512b327cf51bb8737f3941561b142e91c7bd96bb44ded41547edf14d935003275b81deb1733552e057a038f2243bacebe836ea08c0fc35ed770dabc9e42cd941164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744d85451a93c96dac430f7564fbb104
SHA13dc15ee76b07ff221a4543d987f3d54907db2daf
SHA256aa77f2e90328c9feaa10399d5b6d444e5c2257477d50707308b3d1d621fd0d11
SHA512f435fdcf0872060ef2de12287f322db7b1f0b13fbb148cda55a17c755f7b4f9bd9edddf0d8bd0fb37dda9917cc0fbb21c42ac57a86d900e6a9282d6d59ef1199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb37c15083b3703803d21591fb1ad6ce
SHA1ad70bce6704f9ff87106ef778b269ef3e110cc36
SHA256a6224006b82d2a961f403ba8579683e057199d866e1b0ace8998fe68e5d94623
SHA512f2fb1bed16097a140d27f53dee390cb66025c642733a279170c7cbdd458a5c54c9057e87b74bf25d62d1cc3c6e3d1424875caa28d87dde47e987e6c36bbb1bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55251be15ce7118db5296b3e0f49ee19d
SHA177d7c9d508ba8f2ea30eb3d001b27c132f1fc08c
SHA256f494a92060a86a4812100b70e7100bbbce7078e4537a2ddeb763e98e147aeb39
SHA512a1f080f19a8ace8f932f2c3cd2ed5f60cf7e2e5d9d9023cfbcdd1c385036f970c14f5ee8f86ae7af9200b9ce739bcfcaf0a98dc0bb81c54b0d4244ba6b5ac090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafe9327adc6da8d59d9461567ff810f
SHA14c0e304fd9818da62cea859e64416df2129b7643
SHA2565d800c9a88b25c3cc5c99ae2fef33d259e8168baf62f7236e23fe0aa9ebb1b80
SHA512f7c6dcfd49529e4fc39ccdb2ac2405fef2d68accf9222aa0b7337f5f563743f2996115c1f81f7485497146e138a20a52e79744be2f9097f19178db2290a7cd41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dcf0be63b3d97c5bb43388ac1ee60d3
SHA14f43fbbff87f3fa07878cd2c516d4c2fd9a0ed90
SHA2567dc5163f501d47306a024e31fecda93a8c45be25508bf8aa6af3eabff8077c3f
SHA5124980efe2754987b50e97fc1b797a19a85c76df1ba36504fd241151d0eab4fe20a251de419ab356459d5eb1d124a7132734e641253708d4123bbf65da4774f2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1bfced44d18de16516ad60f84fbd63
SHA1dda6da1b68ba098b500a2eced25dbe2043f0fe39
SHA256e46d49a513f17eb126d250f64ad818bc4a7ba14e83110891dcfb29627c6170fa
SHA512ca564ea7319414fd4ce972713c39ee350f6988cf13e51a911ff20918675a6887340c30695b9c81e358389c998e16e7ec8f22c60facc298db7d5efca6951ad6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec4c476b394bcad2d64283cae6f20f7
SHA19a6a200c9b2a471839c3974df420894de6ed92dc
SHA2561e4cc1a2bb06db4cdadd8181ea191789292b4d6fe36fe5bf8cd4b49e0bcc4c83
SHA512b95bf107a4d795838f467fd72a58951a0f9ccc898a1a17756ab5ff249d60689ea81d6d6fdbb38b7d3ea69a2d9d8e16230bb9787fd6670574d9b1ec3e3a894eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9efb21d806f38bf529775d5e7e56cc2
SHA176ee80f4abebe14e27f5125563f2991ace481b9a
SHA256058064962c7d07b3685dd3e2151447f6cea78374e9ee67c35686f7a148c3afdf
SHA512a6963086a51f5016f99ce0e9fb47fbba79a7f15b62c3fd2acf0eadec409af2e3000bd6ed0ddbf6814fe5835b0754932786301c0dba19fa5661753412ccd73f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25ba2fc7c9a696f61ef59b2cdd25483
SHA1aa9b693539bac9577f8084a77ffbeff94be3547c
SHA2569eb43d7e2759649db996b611f51bbd501ee6d05852b95808b9704a06d5423d16
SHA512f61f46a4dec8236200a22cb9687a09714b8712c678a95b1b4967ec86d8427a3be5bf9dfd8fa30ebbde1719940aec24f01f5486ff92082915fe4b20f68f971e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575eb160f96b58d0d9b115a773cec222e
SHA14347a6621cdb2b752db297dff369aab635eb42d6
SHA2565e9ca661efdc31279fcf3364168e6cbc22f5d566de67574bd1c6e29757c6ce84
SHA51238e77cc5815b9c39d040ce3dfeff91644d17c604ec07890b6b6879d5c22f65cf8ca0b8f797f9e8740714c3e0fee0055354ad9ce16b0bf5532cb79c2fdf5b44bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5713b2e4210112c6e83496cf48abc21
SHA14cab6bbcccddad66c1827854bc9b752c116d6db9
SHA2562902aca9c6720ca42f7361bc74f0b739abdfd94fa52f2c46bea935e9b3a76b03
SHA5128f6d10267eb7fd2b076332007e33ed7a11743f48e8c109395b6b734960f9bc67d17e32946bed92a906bca9312072dd9271d13afadfe60e47dc52d2576843b0ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b