Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
eaa0326bae7b4a9e0c41dd8260650b54_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eaa0326bae7b4a9e0c41dd8260650b54_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa0326bae7b4a9e0c41dd8260650b54_JaffaCakes118.html
-
Size
68KB
-
MD5
eaa0326bae7b4a9e0c41dd8260650b54
-
SHA1
50545e37e2d5bccd6f4fe9e61aeb2681aca507f1
-
SHA256
7c74564261dc2c4743ffeee2cc8965fcd23fe01f12d7a55141c3ce4ef11e115b
-
SHA512
df05346e2dff643dcec80ddd643dd536503b56d2c027e56da3e4e77f0d64e072d9a5924ca31cb49cad762e8a7e64b05164f70cbc04c6a45d3748e08f859644d3
-
SSDEEP
768:Ji+RgcMiR3sI2PDDnX0g6s24goTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JqTTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B3526B1-7643-11EF-9112-4E15D54E5731} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000004e77cebcce6f14221cb1dc6c02b798ef23cb5680620b45b905760d227ba69765000000000e8000000002000020000000a2048781f21c48d417455686157ef0b76efd4dffe4eb1d1c7349c19c95f383222000000033403d006023c71637be7b5e35d4f564de61311c48a7bd245c72707222408c92400000000b31503f0b84044a6a37dbf4d0c0e974efb4087fe3b66ad6e8997deba05a17ca6dfd2706c1967bf776237bbf957c557f269c68a7d0b73962a9a18b29b9f81365 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883635" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a80350500adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2972 2692 iexplore.exe 30 PID 2692 wrote to memory of 2972 2692 iexplore.exe 30 PID 2692 wrote to memory of 2972 2692 iexplore.exe 30 PID 2692 wrote to memory of 2972 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa0326bae7b4a9e0c41dd8260650b54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279b10e486eba27e43beecf018e7313c
SHA19045227fd1c39f2682d06a05ad8ffcf9c0b2efd4
SHA2568bd58e21abed37da79f03f07efdb05268a67bacfff9b4f77696e8021aa890ff2
SHA5124c3d0998e233f4fa81914d56a0940a93b74a2c73b8a18161e79c6ce56dad51dc4c97ab88e1bca8a17014b7491a379f9bad32fac4a2637c12cb4c5b549d86c066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d714307e9834017b920a77dfd9d3173
SHA148e670fe2942847e6a8513d1f144f4dbad1b1c50
SHA2561c592c1e42d788d537dcf874167c63859f805a31a855b0b2177c09e1768765c5
SHA5128fa3a230c428629f2f2b41600a88b14e389b94e4fa0af215778522716c86171cfa8aa1b7ea69df61bc0e39bbcfb6efabb6b9ff445ac2a3619f3644d9c73021ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd85fe75a6423358e6a7c5a98703e8ae
SHA1bbfd9a678409685560184181cb8f9759611536dd
SHA256143c3573f03bc530d84879fc3a0b86b54789b014fc90b32e4c4617f2ad638917
SHA512c725f9b73c846f338a632f43c4681cce22a1746938b3599d27a16d29d69bf57859444a3d9887fcebc37468b15ca8b18ee927c4dfe4140e5b7cb6f7e6c73b2b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f6fea63873f365621bc76b7685e6cf2
SHA1d617b190d8f97a497fc972836f32eed469a72e8a
SHA256061a10535dd9b5981c4ad991476d06a6bcf54de97f696feff0eb7ddf3082fb9d
SHA512abb463a13cd2d65aea4c466b6beac3be61f0bc8bcc3a75a3515b561c3ff8b6f9c4491c460d75abe0f8ef7e5aa51aca8cc8294e73f0daa8e52ee4d422f0bab4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e51be3a76058b245beaa56ce8ac3d99
SHA1fd7a41729c7df71169742fba193a2f9556daa53f
SHA2560cb57f3cf16fd5ec069fc7263976ab8df4a1982d7f6380ad57b43586d035c778
SHA5128c5734009bf3867ab15013ca0d27145a5e396b710a67199fb750d45ad148ec4c52ce40ad26321b165919ecce687fbe5211cc46e5ee8ecc135edf31324e1a1a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51333cb65e88aa0c0930bcc918acd836d
SHA107033817cfa83df11eed7e3deb067e6f9cf28fbc
SHA2569d64a0c039afb773c679786b5fded541a92da19336f26829a02b5e2d1bd7739d
SHA512009e771a996312edd366a6ec8b170f6f78809312ff6d4c9c4caf2161145224344e664ebbf6c49978d9fc67c72af130d42f7b2257325612cbfcdc7309c1022205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571e4cd8e224fab7b7213d38c5f7e4861
SHA1d5d1ef5efc08fc52b4f15dbb9e43255fa5163bfe
SHA2569ae5330838e4b1fdba00453009985442a91394f4e9f6441c9914779142b2bf60
SHA512d5b15d482e108a6e7874dd1dfb82788b1fca1f442385a99f493145fd863c6c2a5b5ef889e9ae3178c5394aa6a9c07653e2d648754d99869d60ac708a0646c4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501192c24000e0899b6172d51ad32ae88
SHA1f395240585b50b86be589736d7cde137e85c743f
SHA256d11ec8206e49aee6e911a94442e3918e8aa489b5d2b11acee1d9ee436513afa5
SHA512184e1994bdd18870cd77062f84a2926da716373cc9eec7aa83db6d06c66435f6b61a4040934ddf6c9d549aee7f8df6b714fac871e819b5a4245390bb01201382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc43ab686877d9d07eb5864dc0b70809
SHA15b9c3e04a80495fba3d3a0f80ff9ec5431247d1c
SHA256fbd97c7818880fbc621f2ef6ee09ceb323890142602b10a3359df3021d7d938b
SHA512bff33acdda97aa1bb7bba68b626bb8f706dee8da7b8fcc3c8af6b70ea4004507394bfa9d55afa1a628b600be511de2c429ecfb95c9d56eef9a8003554ae710eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5367f97806ea8125b904276cd2952f194
SHA15823bdd321fdba9188a066feb58c6418e4f737b8
SHA2564fd877e3da572a9a4288b61dd31ea744dd32d4aec8550fef3f2ca6bcf5e3656b
SHA5126811cf9c00d4b4c627129d8a20c7f05fa7a02c369f4e1eb5947e5b5ea1a81bb62adeb5970b9b1cd98407755aabbb36471c08bac8d034a145f3bc8f57b421106a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52375702698d635d1a3bc332e01cc4724
SHA12399f1cc54282cae428950f8d599b218e90f0488
SHA256c9a0c785f573e6fbc918996a13bb59af3a3f6e2cbcfc623192436912e4556976
SHA51223152721fc81f88ba20b2bd9e83bd8f6fb28cfce9d26d7dcd6fff1037c45ec4c3984ce5c9a9be88228319f18103d6731bc953e35a29ac1c22c34d34fa6b54ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd6910b0a2af8c1be21de3a90a9b7821
SHA15ac5acc77c851d0fd5fa63289a52ef624e5f255d
SHA2564c5a367b2e52222f6bf14c8d0781f9595fcf988187073857b8395abb64a4228f
SHA512d4f498a4a14132ff33f1278d48ab2a234f0b73efdb40ad8553582fb45a36fe92ba3308b4a642ffbbb9c3663d4d710b49212f932906d91ec5f5cedf6ed3af6fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54745aa8bd80b1495f8ea2e3cb59899df
SHA10249c671f2dbba1e682cf9ee1f58e7eb52d70fff
SHA256a986489807471d2a669cccfdf716c0f120cb132cdc3b4698648b4b9eb2ae198b
SHA512af268822b204cc7b9f99211ae88378992b5cdea796d03a7af76ff791964e0158845b0b197ac17dc945919a208adfee9adcc6e04a56dcbf5330b773f6522fc3f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58767d8fc3cdfd4e88125c2366fac35b1
SHA1934626405f7dac3f178555aa888d23f109a326cf
SHA256657154f4f8faa29551d8b813b533111d6b75224e78a6088fc35c0f57d302a7e1
SHA512c275f1fda8652c462b5d4f449ed56842a87c15f335ed36f6ba95d9ecc3e746c017046f03907efd81fbaa091c63416da3771616652037b3c52d406a6dcd7f9321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f242981190dc2b77ec79ee2636b33c01
SHA14d82329b4971bb5ddcdd70ea5963408ac2c905c8
SHA25646036b9b4294165dd4555dac778ca39f7ab9b4aa53cfdcd4f0b7d4740ee0f5ab
SHA512165edf6a90e26b23b2e01043dbd0fd67b979f04c9365f9fe86b5700bb72f6dfac5539ca962270f839214f35e10c6fca7127a5fe872b7b837d4ae7b85a71e0282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d29f50ca3eb1400b31dcc603204fb7e
SHA1a733270a069cbe0e94ab7881dfa3f991f3654cd6
SHA25632ad430e297c2f1573746069eec7426bc2098b036e1c76b4008aadf6b25e396f
SHA512416d65fa14f942420247663700ac8f90cf7481d85214d7023d6a62cfdc30d0cd0f7c71598dbcf651a5e5b1c130b2170ed272537f32695b1b3664710c4786d2d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f02cf9708b38c8ed5b2cb9f9c48195
SHA1ab7c3b9d02c660ea7e422b52aba316b0504d4cb6
SHA256c5a41e149baa46dad5f8ebb35e6c07963ff16bc42d514d736bd3eb365e625d9d
SHA51234370604f308ebdb8377678fc11fdf890572949c0773c56c744d7a86b4ed3f2abd639cdd874947771fa612aa630c162c6e57cac3d1015ca5054d11a5cdbb5fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c63f3e18352600a6346cfa645b62b3e
SHA1ab05fcda46b49ca9cbf7d646293ff19612210fa8
SHA256ac97724da18e1e72bc8994b35925da0135a3cc90e2b62779860acf3b8411289f
SHA51208099869abe0f860894b0b6af3c7b6f108129ad1209c651fff8fcf00e77752e0244d86643ccf3a43a089b34e2b4ca2632f2559ab1008c96279f5d1129ef5ed4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e93e71bdc9b610d2ecdcb35665bb5cb
SHA1290df023c128547cdb397560e9aff43ec511e7f5
SHA256664f668754df5453b70e011c6e66868697d8ece81cd5e62bf03d7ae47a0f9a92
SHA5122c0943c69d6a0c4b44d088291a5e0d03f5222775c014d64046b4d1162598457e6fd9d4a0d17e61922cca73e6dc98f87eaec73882ce0fafcd7aebdb3b826e9918
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b