Analysis
-
max time kernel
139s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:57
Static task
static1
Behavioral task
behavioral1
Sample
eaa09b47c2d40d2dd403ad0bca0ca08b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa09b47c2d40d2dd403ad0bca0ca08b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa09b47c2d40d2dd403ad0bca0ca08b_JaffaCakes118.html
-
Size
30KB
-
MD5
eaa09b47c2d40d2dd403ad0bca0ca08b
-
SHA1
99d660168054b191e5fa6f202ba1899e59e6f2af
-
SHA256
299ff228183e768f1619ac06511a4a5b13bc9dabd023173b63e7cee62a83a5d7
-
SHA512
577dad8ff8e657194fe670c0367a3fa6f820b9404c9811582e231afd299fe833a9fec172db4987b35954c48f1e30d56b30dd73b8af3062bc78afc480090f2e1d
-
SSDEEP
384:CqUs0amxjVzEJGEcS3ZQDDGuFmNBEJLXCHxbjnNCRHf9U2ZbDvd3lZ1/:v10aSZBS3f6edMnnX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883727" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000000d2feee3e45c92f9e6654234a25b92a22c5319cd1b9d79b3a526fcf0784acad000000000e80000000020000200000001d47b4de7c5c9b2e14bb7e6ef460a1d20b02683afecf29b6e39ead0c02c21fba2000000087f463f43ba4ea2609a5dcbe3e1aa5333d5a28d7b32ab674c4086dbd27eced7240000000be18242188b392c0c30aae87d1bb56542f9fc73bd0028d0444041b678273133f730fe84e360e28463967573be0031f62c3ea6c0d79e4c87e64755afdf3b8a448 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80aa17c7500adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1FD90B1-7643-11EF-9B14-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 276 iexplore.exe 276 iexplore.exe 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 276 wrote to memory of 352 276 iexplore.exe 31 PID 276 wrote to memory of 352 276 iexplore.exe 31 PID 276 wrote to memory of 352 276 iexplore.exe 31 PID 276 wrote to memory of 352 276 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa09b47c2d40d2dd403ad0bca0ca08b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d9d92344d82407c5e9b7ffa588d583
SHA1e46a4e308a61f4a5e80a724be5c1e02f40d24a1e
SHA256eb89903e3ecc477f82ebe995340b211edc995749f963ba627f136a1f75dfa3c5
SHA5129552b2b374a93e01f20232707266862b1d334cd962e141d3f75944a158cf9e7b6238fd40941d8605ad5005c83ccd155e924ed562818a65827d8fc28d727b1995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba5a48f27ffc5408ae85c7c2e8659dc
SHA1fc464e924b34f265cafdcbb2ed2b96858a204634
SHA256310cd2b500a4d10ccfa6ed7ee52498ad7c4a60fedc8000e2c36af0c42dda5c49
SHA512785aa4567a551ff6a8d81d5930f892f7dff2e0bf93f1cb9fb934e95d114c47ca85a2cd632a6f4aa9a8893cd9f8d205c3959fe3d51e0b0c1039364e4d1b4e545c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4786970444329afa5c6cb1870bc5445
SHA13f9107ff7c1451da97a2b288aeb5dd7f994fadc7
SHA2569063d7de4fa6c573f00b76ddb6588e9ed6465e22476b14bd6a4c6b034bc608a1
SHA5123c56aff518f96278fba271745ce7d85841064ba323c9ea397d8486ad2c1a039879c6e2dccb6c7832c7f1d8626533183e1f3d71ddb212f06efa259d238e4a7311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f740c8f6576c73bfc141ffd756e79366
SHA14a273ba7354c7336ee906ab0bf32a4f6c5db51fe
SHA2566597a8709dd2ec677109ab04892c5c5d7b12e2447c1787766c03d246f1adc741
SHA5125a104d156d3abc423b2cbd8bc78565b4ef5ae8aade6e13a69549339b89daf02deb17e91c695cfa3a8d0d5a53851c5a362eaca661b4a21c83d2b2b4f1065d3033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba691eccc26b9af404e47296f7b46d2
SHA1a86a332584ec481b85170dc7c26cf658f3fa8058
SHA256558d473437a4986c100f7b0a99f9ceeaa278ceeb9e7d265a10e00ac7580e95a7
SHA51298cf7532b9e4b33af414a6e6fc0a1cc33ce56c6ab70e25446aff786c35763763973ead5792a9a1d49e7557db6351dc836e81fc94a8502922d6d19bd0c8bca5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb041b9bac72689b36c82cb4908d51a9
SHA1e5e72f49a914f7f58f5358531f9123ac8bfd9bf0
SHA2565ea61d730bdb88178029315010ca8028e5e0f5778b6fd0dd09aeb072eed47ca0
SHA5120678cb3c9f4aecbb0ae0997267d4a6ea69f7f4394082f6595f91dcd594586a8cf33372e85453fdb1b564d99eb9a5781e31d066f94c5d1dfa8ba8b7c1ea2ada27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e81bd1e09c2e58efb30fda4d222b959
SHA1b9cdc86ca4e389d791d7e6f1e4e010b8d6ef0228
SHA256bfdb377a407599a3c7033bde2097a7b1717af8cf6eca62e5885cb001c6f2d9b5
SHA51265007b4ea49c246071849de118270c677dac1c9a4ddececb34fdedc5c43f8d4716f564c75cf3b7ad2f21d78691a25f19b013a5edd5f7db0c895144a93ab3dd74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511e6248736258ecbaa0e74c771173c97
SHA143163e718fd9509ee74b1c1804d8fc620a430f5e
SHA256a9fcc0380f5d8ae2a5bd904f53352a724d00d0d461e0997ca6d4561a80150cb9
SHA5123ac733c0059896af285a11bb33ed910a9f8176e59e567e48e19f2004dd88d5a7cb1e9d89e538f3439761a5fb3930ae14e3a6e3f2045b6ce34aa9a4550c86a61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe5e61b4863b1a4b02f1a03b80b5a30
SHA16af334c4e8a9666e0c57d78b017aaa18b0c9cf4c
SHA2567b4516b32bdf97d2dd9f1bdfcb01f379994bf7b825e70e129948421b938d58ff
SHA5128a268684b12890f61ba065225632b9d5d08c2692cc8f1eaf9599f6a6d116ddb75656ccb4e7a2722ab0adb2c7707c08fffc46629b5a257c52978fd6a472e70106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55883148e04f19c7746988c37f203c80d
SHA149f002947091f01b0a4632a92d152579eb8d6f7d
SHA2566f5e5c79d060699e7fc27c6589027bdf7472b02d80e36bad9f17c1633301a318
SHA51274a3ffff035332286d869d28851d9c7ee322edd7e776c58cac61f4e55b8e4979854587e6ea7412babe841ce55fab0abaaec1f6fbba2c12211812840a8970b019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414450ece06667710162a6799db5bd41
SHA1195781a7a5b21894d93d51f13db2440eefd4a4d7
SHA256d8a62167ee4b72f210e468086e84bb72276411d8322ccc714af5c7b576373025
SHA51255761d4dd1a0e898a823d314be136ae32f260e8206aacaf856484cc0173ce32ea5747514f9a6c525cb41cfe05a78fe4d4c5bc02c794a34abe6b06b1d7c1117d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5904c2e43788e3def822b80967f2d42bc
SHA1caab78fbe6c6cb8fbe3387338224b17c5a38ad8f
SHA256d0edd63bc5dbb592d6363f946ef67d5eb85164ca5b15f3d6bc17fdbb121ad152
SHA51283600ef440abfed8b97f24c866804340448fff08f2de2a0456009d31312f0f69388b88f5e8c67e0ff859b1e502268e9c5f711a3890d5eb51b66fc76907605fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51001677e7d11ab5057c6cb821dc39876
SHA1d1f588e3c4795ddbda43bb54d6f20b54b772eae5
SHA256021f9ee585ce3b65775ea64b3262db628193511618b9855284bd3a976c057568
SHA5127801d5b3a55c6455ee4ce6163a387a139048a7f51fb1f6e6721d874d93cb35918367ffa72dd5d23593c9d246e356f14096e2a7f672678e8e1c74126b4ce9c860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dcbbc94c7e1c6f81fc72daa80fd3ce5
SHA1d1bbdcbe230167c2ffede3b231187bcb803051d4
SHA256caa53485c11cfb383952b1005075609f54e167a98f9f7f65dfdd01c0fffd634c
SHA512f85edd705aff2f23557b4d54bc9b6e6bdf71e7bb4e801bb27963fcaddbd347ec64cbd8f66ab26136a155ec16bafad1d86d23e545e718244493557afe5975c2a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e012d06f7a3e271d8970b6ef2ee7a95
SHA10fba4a719b9d31b462dd1c28270c00afb16de8b9
SHA256d1f1df2dd06029bf878c876364d5ea3f4f732ad424484a6b9108e3a56a419eab
SHA512ceff51a7586b2b0b96eb3894db312e1a0ea716c85a68d12f9458dc95f04edc5157eae2cc0c6af955641207edc24b0d361fb3cdcfdc8bd5e63cea57576cd26d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57628c0907186ffc173f17c4c29f47526
SHA168c9eab0f614b0b1cea838fb8112c12134053787
SHA25625b818e1b5c95f8a7792c6cc58c53965614c21408e80b3243e518c068f6e933a
SHA5124cf24230e3749bc13cbe5d5917037fc26145eb07473c9340099165affa82e7dfb567b1fd35740c759cd047f7a14920ec6be6ae1a4219ff3d41bef51de87f8ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9d940c1be7511acdbae78aa4efdad7e
SHA12b08acdf9c2ff533ba8d770dd4d3e5559d836e17
SHA25617d288cd11fdc7e53a4f4d2114685581f8bcb3890dbb2d28ddbb57769c4514ca
SHA512f015e96e5ce086ebca2205e0942cb282c152337f5039a1c946f15dac81a9871a91396230bcb4eac32d162ee04eac9ef6eddbf5ffa4f62fe2d4be91560e46a710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc73690bd757a54ebc6cca53c0283049
SHA11c14f2ed39ca44b786755a8fa019cafdb1a500c8
SHA2566b3ac3011f0eb53572364aa3bd7c5ebc2b473b470dd425ef755d7346678a4f83
SHA512df33d9bda468585b5b362ed352b39e8d1c95552126541cc9a9a07f90aa4420726d09276b8fa902321d93082c8252f3bda6f1ee252f0a710bc6751354141d4bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a9977ee3c9e43d961bb4ab9bc866a4d
SHA1b127e2adb33970da42e376e42b3d26ee98c8946f
SHA256d348c31067e96d50bd231899b4122718cae92c498b3a958ed608c5721b6cd6a0
SHA512e69b3b889657f7cd96039f422c1be77501606934377efbc696248def705b9f0428c87eaf7b27f1af37c2237385cc8acda23e775a70c7549757e73f625c9fec07
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b