Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
eaae52f8939459f90d8c760255c5909e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eaae52f8939459f90d8c760255c5909e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaae52f8939459f90d8c760255c5909e_JaffaCakes118.html
-
Size
99KB
-
MD5
eaae52f8939459f90d8c760255c5909e
-
SHA1
86514798f0e7eaeda098f72d46599fbaa7ef6dac
-
SHA256
882d3e13d9d69a243ebd6feb81c8b98284880290a3613074f38a2471f6f56ad5
-
SHA512
8b1e647f7acc9a9ff071f45c04cd4cf2361b6ca77819b2fb671acfcddc69070e227a2bf5891eaaf5aa970f21fce73f21569cd16800026c49dd6a2983c1fdb0b7
-
SSDEEP
3072:Oc7PB1D9eaAIKx+mBPEBbi7kTIEosCApkYnHSg6LATafI0hk:Oc7PB/Nk+mBPEBakTIErpkCS4TafI0hk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3D65C71-7648-11EF-B233-C2666C5B6023} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08477b8550adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885958" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e61a29455f2b9cd7140330be82a294a242f70faa6403e592ce5973c963f2d015000000000e800000000200002000000035ad6cde51ca121c8a01d64c489847fd7c8b60e4b28512d28ee75d90ff128352200000008ee0ed49a24a8689f6b4cb644d1c1146ebd5cd8657bf132373a1fbe315d1e68640000000b6a42f8220da52a5b8eab1acc48e4683bb36495639648119e59e9ff84523b4e2a4b70231839c04839250990580c6146afad9fd3dd7ca6a33b24f043de7571ab3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2524 2204 iexplore.exe 30 PID 2204 wrote to memory of 2524 2204 iexplore.exe 30 PID 2204 wrote to memory of 2524 2204 iexplore.exe 30 PID 2204 wrote to memory of 2524 2204 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaae52f8939459f90d8c760255c5909e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559a511388ce995c484249de13fbd205
SHA108db2973cc09933994d4720d246c32ab9b661481
SHA256e679e7a0eadfaf0547c458aa3505408e9ad4125d253313146e61868457ec33d9
SHA512a336e925c33064a8a0f7f6da8aa63c4d20af13f06d48f7a2a8991c0d3636f9acdd291c03ee4ad55da5ff7c65a808753baa81944f6606999e08204cc4e7928f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f071c59de518bc8b2f5810c6e0947943
SHA17c1c10d98574aef297510f843c79c928d4e139fb
SHA256159caaf9959747862809acefb31f3bc771ca32d33cf026de1b1fd8aa658d5257
SHA512237b402bc9758a29978c9d7957527ea419bbf37b95e2851c753f12e7a74605253ff9c3f659fe175b94020d337fb27107297477ecef9f0dba6f2313fe82fabef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5295f4039861e04666542aa45b3adfcd4
SHA1bfd44611734a14c97ddc33016502f6b1fa7da35f
SHA256053d2e4f0d960a21774bd56e3761d9d55baf652cf2218e9ad781f89bf7e8bdf9
SHA5124ddf2696d8b411657e809b2c72897a9120e4b610dd16d2f12999085f6ef2cb6a017a18f0525d50a6bc5a50fbf184528f81a6b03b7b0827f503689bab9d8fa2f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac94aac30dc96e3a44d026e7cf961b6
SHA1749019126bd0e08661a33db3712c4283e6a2e161
SHA2564a5bd9a306f154e6a7a93671fce8b36288e3b3ba1c9402076e2cfa3ab0460a8f
SHA5129ce64604bf8c88193a73cc8faef6b5151ca821bd2e8e3a6d825dc0d1e33019e63b3142005cf00e660aef5b4dbe17cf5039d9494686e132acee362e0c0d605ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3b18a46e8a93703b4b972fd2e1072f
SHA1a77c6bea530828acdc2bf8259c159f4984c5a415
SHA256eb6d87c3c30c58da68e50818b9754dcc80f4ec60d1aafd0af9d52643603419a7
SHA512461ebaeb42911ecfa654146c8f0e216333133b9cb97c41377da7228ed9ff9440291dc94eaf5d78d9dce6d0e994844bd45730d5bca53f198731901741e1e7a94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b7ba292b08408b5e7df9ecf4e6cdb9
SHA10ef4e4a154df68f6f603ce6a260cf2b8111c187b
SHA2564b6d1f421f14fe794caefec7842255d19c37a7453a950105b0a8bfe86e9e81e1
SHA51299815b4ffdd38c683ebde740e3caef9b4298436cb1cf32f69dd3cfa42a948b01c6bc25b4c85540018c5d59ce898265b93cd3627231eff23697cd93d0fd27ccdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0fe4033102b18e90e87e699935e4c6f
SHA1a3050a7c02fcfd2e286675137e6709bdecb2fda1
SHA2560159204b526b73e5a42e234bea9f41a6a9b4653de25ab253af482da9d9a1136d
SHA512f6c354e723a68ec5efcdfbb070de124ee95a251af696726bbabea6ed41115c5fecaf275d7c710dd791dd52dfb06b45a8cf8e82f5221f8f68ecaa75515d4274de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b3b92d6aa23a4099cc6d53c3ff6bcc
SHA17988a79e457bc5e84cc95b6b43d4af7308edbcdf
SHA256eeaf9d91913aaeaa9815361e89df751832368415598d72623e4f600df57ca66e
SHA512929aab443c4d962ee26fd3057c0ea4b3707ae9bf4267e3d5ed53616c7a102697b70fe749a99d1a5cc0bc3ec643cec41b6f1bd4fec10dfceb4919710daec7b10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5907f4249331c49df629000b279a199ea
SHA1655419247f8a00047e99222be4b2922cf9e68df1
SHA25617e8c8882687115cccbd159c143d8f0e92b84ad2543837e7a0bc438ce6754f2d
SHA5126562a3a7d5f44e168168386251462c086cff4f378fe8b522954b9c42c23cbb12c7831c2a8d80343d7a7d945c76497159db745b9223c66437d0722ba566fe5445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501edf4dd702f4c42ee45f753d584c1c1
SHA14154021e10b31e8f966555949e0342276eb6d7fd
SHA25617b788310cec53369f45d47b11a06cc8ef3027c139579f2e6a06136ff98fbf3c
SHA512503f6f73f6bca95dc4df02226553a9f5e5127df682c9eb944f0d32e2539067aae61476684ffce11b30f828b3400e96656949a0b7b7907f0718867da6c0e23d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f429aa37e05158a3af64d9dc5519f68
SHA17822ae7bd42a9246419eccb00bd482b8fc07806f
SHA256b7f1ac9772cbc5e7d91162a316a11689d0ee1442f25a0b7904d8521d35f7002f
SHA5125b400aecfff028abe663ba220ed75a9361be814f8ff0d08f5218c94e042e673fc71305266378e26068d3174f1f0a0aa5c594459a551eb60d5d3a6cab41e96c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d55ea04d9cd3a41d3a02c357a4e81d8
SHA17c708460f0e5775f709ebf4dd72d44716f882807
SHA256bff0db7a0e46810ef1112a46e30249642be4d80915508a586b1969c6c53077ab
SHA512fcf4db30cb3a70007c1fae20b55ed3a954ff344927ad033b82eaa7dc791bb57a8f4d65e8a54fdcdbb4b1ce5e5154de2f848d89daac069b1c0fb94f3859c2fde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52377e4128bc60ed4f4d9c3d2cdfd57ab
SHA1b99a39608648f7304ea69ab5e49ae0f494d8d121
SHA2565ed9bedc88a7c0ee7dcd72a1d2571c1f99dee71029e0eed220239d26f7a52053
SHA51214930d91e05108e1d6ff449aec5d574132ce6b01f608b3a33caff7611883648a59125c3a9d0308385f34061ad91cb5d59490744317ac4563469bddf1cb3d1979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde7b8b6903fa1b771e688f8a490f8b2
SHA19775bef2fcbc2cb8780ada7a59b7f8cbc3813823
SHA2563de7ba4a626233e0fed2980437b3f1ef947e66c88d047464678f9534be93b1ad
SHA51294b28c2c79d496145a93593152ed4b007949910e7a66874fc7276cb3e42c3563085f46cfbe8bc1cc670765920fd9ddf570ad4f723e544b1bcc02fbc9999e29f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f105e5e89204b62bdef25b5817d341
SHA10b83a5fea39854d672ebb28a462c7fcb94888495
SHA256a54d20f5a38cfc83b231e32ba216d3ee2998f63de6bec3017db0553918e612da
SHA51265244ea4d127e805f87f8726982e4cd91c4bb687042be62a4078b1e8c4df82f983ab186b6f11f93e24845b95f8e8273c2cac1d8d140ea1ce6ad072f0a3786aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f18856302789d4320610b4b77d27cc15
SHA1820af0844bbb2f6afcaaffa4d38968d4a1585b4f
SHA2563ac845c28bc796ea13c52c19b101d4c9e0dc76a19c83eef12a3a0d4d21c1e027
SHA5126ca02807f077d7fa9f162409388bec9a5a63ae68616a39f0fda1b10ab2a6f152cf48e0314eff5daf48cf911770334136e7e33fc015f2b0bd9a2814b5ff094aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c38617772f02e76cf57d71e03e1ed0c1
SHA14b2f30afa7273fdfcd1e491fd7cf06557fdbe8cd
SHA256f4288c8880e85fd3306f6ced8fdcad78d2bea5cf4ac18f25e3dff61eca83859f
SHA512831711f8bd1f1ec5be3f4210d896297b5deb78f76054ce9fad85ea7e47db3917b2b645956027440d93407a0f212c6757b580621d3d8a03a625df9c7ba51e300f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee683a210af3d420846e7ce5c20bb78
SHA16c9c13d728d00f1f72d3a7ab5326b3e7709f3a59
SHA2562856daf294d1770e07cf45126f9d515fe1ba0d929ecd4718de0e44e9458f99bf
SHA512d6335b3fdc6a1096834f6cec4af87f1413ca701245f70fd866c9ff812ab8df7df0a595b4ee08c0ce023c294228c84daf4030213495ff75b10367cbf246b86ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54741db065fda22c614ed35e3111be28c
SHA17a939d7628d40d74d4c6119b7849453b320801f5
SHA25695548fac91a342573aff8b17fba8652020d3800a306b0b5f5d7b7d91da98e6c1
SHA5122d98b881d3cc06958543606893c2cf05e65848a1de05d742176e02c5518fc9bb7d547e8af4333cb3a3f9bc1d9c66d65c40d61d4e6e4401a77e3d5b043494ccc3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b