Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
eaa189c45a725c74f705341551111df2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa189c45a725c74f705341551111df2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa189c45a725c74f705341551111df2_JaffaCakes118.html
-
Size
3KB
-
MD5
eaa189c45a725c74f705341551111df2
-
SHA1
30d33f89133cd9106f22a8d708976b78530e9f33
-
SHA256
ca499f4b6a3251f020f22c1643bb8ce4ab74136c2b8ddb948116496ba8a5a151
-
SHA512
59470a49cc888382bec68b8dd5aadca360291e1582a0608e1838050523236b135b565e24591f4dc005d60ea87df45144a8e4aa2bc766e8af0d37277cb98a3dff
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883899" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004e185b66f7dd694881d516e32c8938e6457b19da566762b0df416fafe387b513000000000e8000000002000020000000626b39d612f1c7d31c1315a877d027e2828fb741a90d7a9e6b37a516e330b2a6200000000f013aea933327e6e5c82fb14783048500a29a180e425d5d48796b5ff9e56fc540000000d375ece7e404435d3293b7f7cc19d51e14d1feaef99690e0584bf493f6d33098a4ebb845be93adf934da176c29484e72b2247efac1e7516d5372875f2a6cb927 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004fc6281ddfe1133f5855575d230bcee6174cb00e84d2d6c3e3faa817d532bce1000000000e8000000002000020000000d14c00eac805741a6c89a42046724b76f3cbc11cc8336993281f7fff8ed87d1e900000008ba86d1cdd9294c8d7f17fe820f7a724e8e09302c468c6e2fddcfc160ce1fed6285c628db65eb76c0c8abdc7cc43dd72c13491936a7aff4fb0f83f7546acfd749adc9b9424da1555d0d8a1462a4b3dd55e68eb0541e21b21072ca2e3a912364acfdbda551af2fe28f9d34e271b6d512909737271aab0f4a7c3248876bd0c5eb0f4b1bbc15c6c5273498737f1443324254000000011a6faa6b502b2f32c77fe56008e8fdd4bbd9c545c96ce05784d41d345e84d42716d0525cb3227a0d83dc8ca5fe2ebf551b318a3361c5585f81296a8175cce88 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1921BD71-7644-11EF-991F-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5061f6ed500adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2864 2680 iexplore.exe 30 PID 2680 wrote to memory of 2864 2680 iexplore.exe 30 PID 2680 wrote to memory of 2864 2680 iexplore.exe 30 PID 2680 wrote to memory of 2864 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa189c45a725c74f705341551111df2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d47640061eb7cb0b51963887b7d6b9
SHA193691c6f176576fdf5750fb0a6686afd7bba5d2f
SHA2565adcaddee674fa2d94bb6ec9358ebec8dcf3172170919136e5751ef24b3ac6ab
SHA5125230f7f084b13d1ee5c415b056078ce6f64f00ffc22bc1b3d38ac8fc2c372ff6dbd918cca3ad33b15777e3cdec6547f2f249dc0d88267ced2058e06b2a6feea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be1a881db7beb4bcc37d509344ab958
SHA11855bf25ec8b96af51564bab64453ebe48cbb463
SHA256ec8ae3f704ca402c0b2ec27f0db3a171f49f6090389600f127340897c9e07313
SHA51232e6bde968fbc5753703326fc9b55b7e68ed7306851d1e43d5292fe052dbbc5eb85fe6b01e94781e6369126abb442ee9c507c02102cc2515965aeedc3d687ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd78c9be6145fb76278222a629cef15a
SHA1419ac1a11ffbdeb00dc239b25cfaea41a30c7ff7
SHA25698336a66e3ca8100f29c46173b222827e879b7ff404fde889f798ea84eadbca7
SHA5120423a899a13c721561c3259417f2e174bf6bc62d07df4f0a20de3452a05094dd5274444a65fa772974b37aaaca0c9ed6338e419e42ddee6bef48426b03a94bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad2816f04230152994fb185ffa2d4c3
SHA1c6d5201a9bf0a5c128d260b78e716f1fa7748cf9
SHA25643b894bc0793694df3b2bd0c6de51c9abf0733626f057022bd3399638d00f5ca
SHA512fd679538bd9d00abac68009d939a9d085749c1e0d00cfc78fd10826ac5692eaec74526d297854bc4615e25a0eff07e3e34f91acab4a83296e8fb5d1fc2d8ef13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59000b4e5827f9fcf971e9b9231fd9b54
SHA11e11e1289c6a6fa670c4d32ff25e2f8749aea7a0
SHA256218224a56b9f1feddc04dbd5c4fb76be9b97fb8f50c01786e61902dfcb13ea24
SHA512d120b6d3b40f4eb8453fb3791c84a77554a32f54f8a076a818b4839ca296c40ba73174b493c5756a63196a63c57ac41c9e3fe005096660c2420a22216ecb13ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f095adf6c89e25617e3f0235773b520a
SHA1012d8a2c63b835cbd94fb587ee9124c6b7d2bf4f
SHA256b94c739020e39e15efc58039e2ff6c2fa88c43bfe5d15ee6d3940966b43799e9
SHA5126e30f1608243af7360065e0b49c3e398d67ae6f14674e4bfb7beb620db82a0ddc66e6f3a921bf8b1f391c12611b7919ac9ad716b089efa29885d3d2aef1a2d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fb7316a6068bbb678eb4f98df00522
SHA133c72deab1f302fe682c30de234fc5971863fb65
SHA2569f76c428ee4b9871e3e15887b9cfeee40ca7aa391f47c7fedb1257f92ff7f7aa
SHA5129cb33e6e372c8438899cb0184efc0b9e3a07403eb1be22286d5489f98cdb93d708190cd39cfae31f950f12b1fbe82f25e459d490d3af0e8998ddc6e91ce48d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b7039522c9e95afbfce04c281446d4
SHA1cf6b8995cfa7a4e780bfd2473a2bb14a94766626
SHA25646c104d2c304545c5159c3b35ef61858cce73344809bb98489a653ce3fe48d0c
SHA5124a7cca60d9b977491e4dbee36b9f826ff688cd40bef5b2574ef79aac8a4439c9e0f04f585047ed4050680f8a5aecfe3e3be4a24261a305f53b1e35ed67acf3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b6cb884211482804c075dbf69cd94e
SHA12616e853395b3f2e6648ca29c08eb479619f4d96
SHA2560f38c004f57f08d70f637acfe3337f61c6fdced6349ef928c0ca23bc1c75cd7d
SHA512eea738f4b6e49e30f83722de85297aff1e3f641bb2be0b4bb7926b334e893a362d338420170da059c85085eb0790ce19945113f3368d62bbb141d67e93b8d30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814ad389f2cb9e55742d8e38cb753259
SHA158a8afa045f4f0e39e820ab917deb704a30cdc21
SHA256d060d28eea951af8b5b5914a71b4bf94c127cf09f2553f042b73a4f25c65d061
SHA5123ccade7bbbd3cbad80d1a728174f33e9f2e8a6437a9840b4a5431ede7d2c95ebe502864a90a906826ebda172fa37a5bcfd6c061db9115c49d52befc037830512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e1974fc47084371b997cd797a2d2d5f
SHA102822418191521d1249b6dc59430950353381d82
SHA256d269fad39f7cf6698f2813ae7cf478f7452366d6ba8da8a7ab1e4bf8a3b7210f
SHA5121221b617952469933b8a6c29a5d662e56285a7b15cff1469bc4f19b7ecf00c4665a198bf10f4a506ac265bd4a8c4913b6e71fae75e894f420b8d4a835e912331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d99c5b56049bfc1f739bdec2bff173
SHA13148fceff275b1de7b25117d0ecd389d4c447227
SHA25636084088b03eb23e8e1493b4c93dab266b6fefa3d41b177044fba3f2af8ea72e
SHA51247ee4c698add8e4f7183c8145b3d0bf397f0695b1ecf7e7301fe45e555ddd3efaac88f1f7ba16dfbbb8783046cc17bafb06044a84e08ffcfa7d9449ee645248b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d753ef3d62707da4a01b15659b04c968
SHA14746ee0ce53f4192279a75a29cce46232a015d8b
SHA25603c90687d7560123090ba734547ef98fea86c7a1500c0b62b52a7e36f11a236b
SHA51223a0896c6929080a8c9744a149948ac03d5881db96d6abef55a43642cc990f7399fffbeb08da88036714f6e4f1aa2f41524f5622421118afceba6ab1bee1555e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85771a589265c174765935673eecfd0
SHA1e4ddc056ea30fcadd26c8dd7dbe943e7aba12195
SHA256caa8b798c0638ffea3fdfd6d8edc926cac46e16f9da5cdb4436e8228d9cedccf
SHA5127a007fa4c1fab8e38af29420e6917cdd9082c35ba0feee4826bb576d654176c821c72a0cbf742ca034d1efea811c671951c2552369746f6095dc66b52779249c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7e5519456d1d1454afd19581f9d284
SHA122c5961452e7e62dfd9844eef231e73662354c9c
SHA256b053290db8a59e2973251bf32a10d2dcfed49e7fa73f60ab7ccd892a686a1ee7
SHA51234b7050be9b7fa7ab1ce6e2644fc89419d1214cb38316139009ada1ef0d5a15446a060c40bc6113ff41ca1c6bbf139db8df8cf29e11f553699abb664ccd47109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b455747f4e65b1be3c430578c560048e
SHA1a920d7279da0775707df907eed8a445cafdb99d4
SHA256048f981a1b65384f43d1cf94c59dd5df47dc540a0ccb461b90ed89f8cd52b74c
SHA51293e0d749eddd193f1895950616ff01836b55c5eec48ea53b087962de135eb1cc7420540a9c6f3869096c0a586ba1d3c73b9da54a857773c008419d2180a36c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4dae9f117616b95c3ac55bb8215d8e6
SHA137fce407379896e35dc6265c2042a07f21c7e390
SHA256b29ba4b22027b62879fc2badd9d8063beb77ba1874c260004a41a6026a425503
SHA51287ae8f6674c76d72944d6f46b7f5ff11efff22cef46edd159279a5453aa8a489171f00964b2bce713eed6ef06b9c41e5802bd8c2598494b5af7b0d9ed3659891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce356304aab0175fb633b68e2e4d365
SHA196270a2fc660e4e1f1237b2912081431bcb28f2f
SHA256dbbe7036cb753ab8ab852b67caefdc6c099da96efad8ee24db08bca7e23d62f9
SHA512d863686d945bb66dafa4efcc93af4f0023aa6fc47ccad388b9831f26768459efef002329855bbf8c8dc08d80f58de8ff10c822db833a8bb34d07e237e4e45310
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b