Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
eaae6f7e938b5f5578f7a337bdc6bd31_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaae6f7e938b5f5578f7a337bdc6bd31_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaae6f7e938b5f5578f7a337bdc6bd31_JaffaCakes118.html
-
Size
22KB
-
MD5
eaae6f7e938b5f5578f7a337bdc6bd31
-
SHA1
bdb8642670601c666817248f8e6b297dde638ee9
-
SHA256
4f6561f7d1f62cc4de0b788a341690699fea10dbd73a237fa121ad0e290a0460
-
SHA512
5c67f3a453f478eb82a2ad407fb65197dbade1394887984eb734afe7b486f0afc9d7e755cd1f1b105cb219c62a22a800c25b8cb844c141fb2da203c925a8ce5c
-
SSDEEP
384:XUpUP/T8CfAbehFn/jIBq2tApBMbZoRA9Y9+kDhM90/GSoEERtTdhYHVVAvHdAZV:k6p0oF/jI1tApCyEaDdM90/GFEERtTdO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F17EBAC1-7648-11EF-BDF2-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60257e05560adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885980" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000003281ee3a1d63d21ed8fc4fd5c0a25bef146e27dc913d254d9e3c858edee30300000000000e8000000002000020000000025cbe2e8d468c47f7c4c25b1b020d781a7642d6e15fd9e1f06c5c907f6a847f2000000066a8372b796b5f0b83be301511dfd4a56367b907bba37d1879251cba9c88928840000000abd11b7a256475a6c6ac4280990db8c047d1b81adbf087971faf7145378ed4d9a191ed65bebd4cb08d1ac4ebd650d2cea8527ae056a0998a3ea594fce2f428c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1128 iexplore.exe 1128 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1128 wrote to memory of 2316 1128 iexplore.exe 31 PID 1128 wrote to memory of 2316 1128 iexplore.exe 31 PID 1128 wrote to memory of 2316 1128 iexplore.exe 31 PID 1128 wrote to memory of 2316 1128 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaae6f7e938b5f5578f7a337bdc6bd31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfbe42156893d0446ac0a87b3b4a71b4
SHA1d8fc51b898338af40099a29d01b3f3d92eef7278
SHA256e7095398d87c8e965cac967488cc9a7a65d7f84a010b2c773ceb817e03e2e80c
SHA512edf4cc6e8c1421005ec90102c73419036094275f88dc84109b6bae1b071b28d93198ce16e3d54003aea94aebc06c5210a694b1236700cf8a9a2d1650f6727399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db164994cd27cf6293289bf561091a93
SHA143b7305af1a9700a8d9ac86af227466e9bb0613c
SHA25613513e69927eefbf1ac9e476a3172c579af6c476b8c101b80f43bab6d9279d5f
SHA512eea29d8057353f41b940e97c769ea3e60f39a8a8529c8ce3391ad609fd8978757845964bafba159e3cdb35738749db49da1a85585ea07faac5004a84138afdf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca34ceb817612a752123333721bc3ef9
SHA182bebbf0b850b9761d03d15511c4f20f39e18808
SHA25693202eb6bc3dbcae8cc39dd78afe6b5179fec53fa96a6f7bd2698442226d14c2
SHA5126678506906c81e6e13bf530870401cc1eb1cccd431d6e95bdce84faf4ea92b50c2c0c5cfd8107c2c739acce8c8062f86ed3d67447df9271acf9310aaf407f254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5123a36482eaf3b9b5246df58b3f04130
SHA1b31757abfd8176d93953df16da11ceb67c21533d
SHA256592420ac74bc6e2374bf7db9dcb13c2cd0c7900eec88b079c8e819fe362d20e0
SHA512ee043a13cdf4cb84789ee5a391edc88cf455f4bff92878a72ef4c518808fe215e9464b2efca60748e2c621d738c5d9b928f351f15cf12edd2a5e84d31c206669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56984c27c6fe690d94b5a0ff552f79cfd
SHA118b20669482c08a23c96e3fe14202708b950d094
SHA256ed0d3b625fb576ed48e2297e770e4967a2f7d8271339fb988f0a505de6aeccf7
SHA512866b0bc0a373dcd76b8ccfffb5c54e52f4062872ed58d8c55f55d82e9c9fd23420a92f4ad8504a632a6e59a117fffa22b5a8c9f66a449270a9583fdeea1efd9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e33e7e45b90936e7ad3b7bb73bdccc
SHA14e3fd824b1373c1c08a5b0a1faadd5b8d4c6acbe
SHA25696d9b50f0cf06be7243b56b9e3b5c92a8abfef7e7e9037809b6d73840e3d3dd5
SHA5123f95dd6a2dd3207dd959432f740eb8fe448ebe82e5fae46415bb9fb576c2fdea1852408ea41735ee183715a85ff1337e8d80648f43d5e9ad7d1acbab5eea1bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962ff949c2be4bbd861557165d80853f
SHA11c25261d80d751741de96d20b5d4c96e169ea7ea
SHA256eb2fc28fd755e142c858ca8bfdf05a90ebf3707a6dfad808c4c422c3ba115be6
SHA51254593502f1549086e1e9a415f9c78be50bf6d10d42c34b6056f809d406dcc11c4c7494521c9e36808dad290c99175d59da7492abbedc4751505204879afc4e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b191b8857838cb8e2f41a939eba6fb3
SHA1ce05e554791bd5da3b991552cc59ce9c15802947
SHA256d3a6bf6e34892017b3c3dcc421a177ceae449458182c001b0844f3065a3e8531
SHA51279993fe6b7d4db380f98414d4911e162bb34f35aae482f7f9bfff4638179e32ca1c51bb43ec223ed7039925c0e8e8bd01124ce9fee51a0a322581f6f3ee37e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563dd5b535d61a4deec1f2219a7d3e921
SHA1933c1dc4e5eefce1ff9b87b78aa629958e8a359b
SHA256d4041024ff76e3804eb70e03cab3ea210ec54a7bd47cbc85b905ee57b43162a2
SHA5128ce5b273a0e5ff42d3bdcc0e3ae3cabe76afe58d3ce1164c136ffbd75d465f205710c1f3e359774b922af1ff1414e3af04dd7c69ed1dc063efdb2fa448c24964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400df1763ca0a9addace1f09e939d408
SHA15cc9233a7bf4cb4d3e35c8eef28a9e99f0d491de
SHA2567a22669f48789d1ee3fa9fb4b96e7186b38699668b5af97e033af18eee3ffa58
SHA5121756de4a16f183082b3eac2756f8e2fecc11334f48aaac3f9a2478c57e050cebeb60de2190a22e3494d58232e714cf60129f46d2fd2cef8bdafa10530272edf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e73d9baa34d22360e63c593044b69ce
SHA1ed49bfbeb393475aca20b76ddec5d316cc4bf6ea
SHA2561696874033e41b16851cd537276552d725ad260d943a7a7a5ae7a9cf9066c77a
SHA512efe87efb1a19cb8bf5ef219fb41fcbd161af0ea2b88a63fbd464bcc28ef1ef756f7e0afda7d483868030ca306583f80ea19b036395f84aa6a89ba5e2a2f0740c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974772fb370baaaf7ca76104d7a98fc4
SHA14489fa8efc4df0230753b24ff9122610350ab95f
SHA256c453a5efa9cf9968997aef1f4823f783a414f8d629096c8ce01ee5e60267d670
SHA5125fc4bb47db78a2f277d4e477ad590f5d2f8be5145d4cd437acde751ac0aa2964a1df317ed800570cc565e669cd73cf039f82edb9c60a27c18005833a7d51acd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2be225cb448f1063d26df141f483954
SHA1561e84d366bf28762374e4edde5412341a32bd06
SHA256acc6e7278dfd63ca0007443d39d7b8b9895f2508c7137c7408154291b6e193fd
SHA512ef76001a39bd50c182852b0333d0c75130896374eadfedf99df7f073ed50718a1b6dfad76c68badf4f274d80ab54c44f01e105d2a4caf85a248eedb859cfca70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d71c80055300bc22c9f2b8d0a456d540
SHA17f148c1e41da5fe346962002c4a8cf436ed5e9f3
SHA256a33eb2046d721ca6917bbdced6ed53e944a3843f64ebaa7b8745eccf88e02091
SHA512f0789fc30bc38582424fea01be28ea7ead86df057b6ed743ca602b73d3ab7ada3daddadb21b0e0a701ad83864c0911d7cb1fb5c490186a0dad3e0a8fcc61f836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55838226644b704ac64303bf9f8b7af70
SHA182bdfee86beb26c18716d08344f4cc0a5949aac5
SHA256543e5cea01401c5d90680e8ff888a54a86a51416ebb54f1fb67b44c4f3402ec6
SHA5121897193cbc691653d429783abd73769eae5e0fda495326e0128f8ec3246d50ee9476f10b3e34408914b78b8241a1f0372dbb440a64aa70423407ca5ca0fac3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585844afb70c9c13fff063db0c6dfe1e0
SHA1de69f2ad6ef1e92709b2dc764c840743a682275e
SHA2568342ebc878aff5e3d50d3d61d7901f9ee06e2ebe34b743e02d3aad98764ec2ed
SHA512449ab3e6e8df330f014f26a15aed389d916d1b0212d0621a385df196b8efaaaa8d8b174e104ff1a32addcef849ef0571f54015e62bf58c95a61f8b9e1fb2fd45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58524a82100cac1de37b443a08a337928
SHA17c0bd96a137d13c8177341dec1dab2598adbd0bd
SHA25604e2ec52be1438607ff2f89a58f0d40934e52eeb8edb08585d9327dc1539c66b
SHA51212cce43c6fff9e79fe04f67977174ce06137b85a80ae481043757e9982ce2b2953999351c1b5d7d8316cd13180ef037cdfecc65b4037039c61e20e01f92cc50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54826d831f6c453c1e2ddb243363cd602
SHA173b744921d90233dd579f333b396f2e96578107f
SHA256ca4cd99ca18d06e49d18e0cf57baae5571c73f9cdb052ee83b55fe9bb25d53b9
SHA5129b8892d6d740e4481738d6d60a6382a18e6875509fde852cbef4e82cae0a4c9fdf2882944ee7a9886aa68b6add99e2c7a5ffd5bb68d58954772122358fa89e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a813abbf2918cb78be97e812586df34
SHA1089670a7176ccff5af6eb4a4ab38d1ef324ed0fb
SHA2568561596a6bc2fb7b7641d3745ff97a17fb39ff561943572a6f8fa0bbcdc20300
SHA51284b44984474a20fdae632d7610e5d26fb0b5142a287ab388b595e1cd9af897160378751e28a427c8e8c0a760b7825ac336866a79a9a9b28e055655a9477e11bc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b