Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:57
Static task
static1
Behavioral task
behavioral1
Sample
eaa0a11d5143f4235771f2b1c6b8bf32_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eaa0a11d5143f4235771f2b1c6b8bf32_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa0a11d5143f4235771f2b1c6b8bf32_JaffaCakes118.html
-
Size
44KB
-
MD5
eaa0a11d5143f4235771f2b1c6b8bf32
-
SHA1
8b7c2b329ed1f1267ddc2cb2edacabb53277d721
-
SHA256
2c1bdb3b06c47ae3f98e9e0d12df60784c66a0ab0c01354bbbb59e0eba2edd26
-
SHA512
636ee25cab60c750abfc53ef1205eb76a18ff2122708f9ad024703e3fb85a092b9ebdce0a331ad9acba615ce944bafd788f7dd0db89d16856780f9a0e7bbc873
-
SSDEEP
768:u6AbVs+YhEijZeqLIREijZeqLgTbotrQrrImaP1l+l+bE0YwykqujDAsKqZoXl58:u6pEijZeqLoEijZeqLeQarKfgRAVStJi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883733" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B628F2B1-7643-11EF-9438-E643F72B7232} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1384 iexplore.exe 1384 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2132 1384 iexplore.exe 31 PID 1384 wrote to memory of 2132 1384 iexplore.exe 31 PID 1384 wrote to memory of 2132 1384 iexplore.exe 31 PID 1384 wrote to memory of 2132 1384 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa0a11d5143f4235771f2b1c6b8bf32_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5ba9164eb7fff24bb8b02834a1ebe84ab
SHA1d96530a6510fbf8da500a0b5edb4fa5366931460
SHA25623aaaaf54e62dddcca4a36855a83dc28a070c814f87e251ae0b68e36f1a555c1
SHA512ecbce18b9d029f6595165bbc1825c2709e689bc96e73a8fe2d20bcdf85813259ac138737679f17c3df67b8f155106c5c0655c0ed7daeb12030081c133cae2096
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_F968CA97A68F4E6D5C104EC7FE3DFDEA
Filesize471B
MD5a8b199d725e204fa9db45cf198e23b91
SHA1cfdb28ca6c3d4bf5873016fdc265d4d54ddbd086
SHA256f1eddef6988eb7ef72df5c71df7e57aaf2e9097a8db30479c97c0417cde415e2
SHA512b6edffbb3b072034f804845e9c373ade96b8ec6c42ac9ef819c68dbd2840f2a8728dda9710c98d56a4b59f9736342c46edcf1c646525bee6eb400a545d8224ec
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5aebe31efbfa294d422fe5cdbb30f7db5
SHA178c2ff7a37be7935a7ff869067dd02a7184b33c7
SHA25618502ac55632ae67c371ccd217a4e863da481154800582404996d0a959b2b8f9
SHA512493663300b0be39843211f47a23352a657a31a68eeb775aa0a1a9830c6111a0d4e98108cd5b141fc4a4cbda71ed659a0be68f876189f5f2bb36232ed81efecc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5d6800b2e2c87566cd703894d5e9fb4ad
SHA1fc6676ebf9e3ced6af059e0f9d503effd123860a
SHA2561c5e0c1efb8d3c5dcca4daaecc051324df4396fc46d9cd8ee870d2901170eb5c
SHA51282199628d88eecd7e0b147cbe34de149a308c5ec9d752fb27422ac0790bc711be13be8907dfc0945075a8ac8af4cb4574c698d134d8ae175d72e752577a2f364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a47034c92e48a6bb8b795a03d8cf7dff
SHA12307c05dbb676ea7581530d25aac3f4979afd6c7
SHA256e950a736a5d1f55f7feeec806746e254e142157b739549f380ebea261101c6e6
SHA512f55cb264278ec3fa571b978727defbb1a63da4b4232d6581e3d04d7de2b8909ff317a1ec8e1342f93136f395d36df005d0d89c30ad7901745325aa2e52394806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5101abdeb97d454ed2b949fcba4164c40
SHA19965d8be2d5ba74fa62e60117385a33390d21d9f
SHA25618a2587e3903619b2467a8707efa665fc9a1840f72e3b99ae8ba18570cc31459
SHA5120e3f5b35fc593c402c99b69825c03dc7aa4bb06c6bb3239c9628c9b74cac1b345f3fd5cbf9c0c549240c217ee9cae23e03f516b05eccc18ff59b3087be99d8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0745047ece416cd585248500e935df
SHA1d55d87d58d556f9fc16c8e9210164bbb3501ac6f
SHA2565de1b9d23c23a182529a0b2d425a83eff68a1f24ff6ef69657fa6f83c10164a8
SHA51229dc227d069dc8c15d80376862de3f35b45c9ce616a76f38f35862814441f4e9c9b64c6017ea45528c5cb765e068d120fd35b84221dc3d34fc022510a0c838f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8b5ecfd7ae3e475a80edd40bd3f465
SHA1e52cd8789086a8101d6915545d5532066b05f331
SHA256afe52ea5f9ed82e1d9470b22115fcc0ba9915d48ffd76c998185054c8b8ea44c
SHA5121ca894755b7efac3a7883d303d2eb219a57231df1b31bef166d0600d6d6c9c15943723cd08cd0910f55ae075c3f2bda6a4ad176a739bce37f9aca378e7d4316e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f687a224470b12ece70671e9af77e563
SHA1ee6c7484a2fb866dbc7cda1af0e32f978200ebdf
SHA25661fa30fe4e73e0f3c5ef2b352d46aa6a2e5acff2af6c716a0fde88547e0d44ae
SHA512888202430f071f3c166ed68557a7629ff8c1047718b467336e5bfec410d715fed4c8f743b78320a22f51e3ff2b34d2aef9cfc337be05d4a48c844fc9b1cfb137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a53847141515601133092e9c4d4dc26
SHA17e3eb2c0a78384c9f3851b8d6645d5201c672408
SHA256d5fa275a802778b67b7a1aa8b9c6531c774bd305b6bd16ecc3493dfaa193319f
SHA51266ab60c52347dc582e6b9b849f0ffdcdd316267653c3b3b3031031d91ebac083cfde45bfed84b0a02a7ec573c6c07a6827875cd33c14e0d451520bd5d1ff5749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a500576349d49a43042e044f598bc9a
SHA1521de8ffbe779ef666758d1b75c32e23e5983c29
SHA256135f7df868fab03118590293b4302452c537060bfb014889f4d0e4467d35878d
SHA5127f95f400f342b9fa15ec9f584bbb4b1177e2983f99e19fb304cbbfab007feea79201ab9df3a67276d454c7c7af2610bb635920c99c7d52cdba0841082cf94bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03140c9e19c8699934ee006e16c6379
SHA1b3c4849fc6d20ccc845fae4ee98312370b1f834f
SHA256d1df90181523b2fd14b6403dbad892ac6b64e8696b94263ede63eb9087b8e613
SHA51282ea9ea71bca7537b3efc648d5a1f657dd0032f164168e4fc349611590e9b45e166fe12f7feb3a84dfa671c92677e8ba56b34dadd996d19f0619243957549e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3993ea47616fdc2766e03587d173569
SHA135625a556fe8aeda860d0ba8cf037031634112e5
SHA256545ef523810b2c52ac49ee5d5a2b02f6373a576fa1869669d0185c2c3410a51b
SHA5128f2e30cf740b1dcdfedc011c477ef91c4c698a2fde22ad2729b1871cecac52e71b2dc81d7b81cc538f3b992b3cc964e684be9c6bf6efa986abff9cdc18651291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c9cd477b1503aba84b74fd66dded21
SHA1fa9b3bb0beb723e153a4ec4725399a21ff1f1a9f
SHA25642421636c07d05d88aee2706ca130d8ae808f9f1a10e87c8e03904b80bd3a252
SHA51232b31c4c474f33be2ef1fd8afdec494862aa80577b098682705807874f120ba8bf218b77f2d2766629cdfdc930de45bb185954fd29d05a2cead3b088f95dcd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33f770567adabddccaad4d0dd30f54c
SHA18c11ab4ee90aa482823d87ef117ea8250b6661ee
SHA2561259bd40a3cb50a033ce6a84a399f0728c61d9cafc5ba306a0eecdb5704bb95d
SHA512098eb82b6f58df91cf824fbf0acbe7592909753ec8804cc33902c2765cfc654449b74f36532fcb3d605b09088523d9dedfd776848aa4cbefddbdc0a9315e996d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55deaac3377a0cfc115ec2d752c0ed317
SHA1e4fa24481419d97a5527505cd9b5db51b034e285
SHA2562fb635df338089d93fb93e1437faaad5336c3b256a545ab084f29ba78f365c9e
SHA51297bfe9738b63877895f19a079167a31bd9424d2804a70545191e6e885c07f6d3180ca82a3e88a14c5c054237bdee847c33e19cfc818165fdb1ab3e642fe5c1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f97b9aed72b10158b4b17a152470b09
SHA123510f8c72b3e4bbb68191800ed981f5de877ee2
SHA2563c181f6ba3581a33bcc6c4cce076341fbffc9e3e3dcc2108f8108396d6453e71
SHA51294e3afabcd8e6a56b0925c1ad9e78020726bf03a08b223b5cacc58b3b85cd18ab61bbb3cd910fde0b3b58349dc02f92c3818d6fbdf39865ae73b0d79de27a8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_F968CA97A68F4E6D5C104EC7FE3DFDEA
Filesize402B
MD5b06449f6fbccc1844038bbe651e59323
SHA11345c882ad17f7cb233fbba42e22738b0d968d68
SHA256b3463eb80bc2e90b4f6ff44fc9892161d1320a72792e9ec67f9ef228b5946c93
SHA5123086209b4cd1bc3ecf88130dd24667b040ea8d3654b123fe376b0be23f66233fdf063febdddc7eeec74d2fb818717394e0c661984783f67ec3f0ec8a96b0d6c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e943067a86f8e6f018a44623072a5af0
SHA12f4b77b0ac968344f4652e62540cad7405b0bc04
SHA256c2ceefd99c6952451935041c7672b342aa69e58bf35ff33b6d0764a4cec86132
SHA51268ca31684aedf552d1c6f1efa618861960e20deeeb7a711f412d3cabeb37d462829caa23e2570ab3298ff336e84bb6de42789d7f56dba38065a390c580f14a09
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\plusone[1].js
Filesize62KB
MD52b72da5279576c62e6e3bcdadcfb86af
SHA193255909ac2892a54fcbb2a4445ec1aff46cac55
SHA2564243c6d726cd3e7056a4ee7efe04d9eb84ee713bae54f0374d6f8d71d0822481
SHA51251954e78603f08d4eadcfb58593624100eb8ecff1bf3f7cf4c6c43b5cdb317daec90e6919a71f12e850f424e8ec7e0bf51a9c782beb5a3b7ca6a8c604a522872
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b