Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
eaa1b3ff29d64217b70b7f32bf3e615b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa1b3ff29d64217b70b7f32bf3e615b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa1b3ff29d64217b70b7f32bf3e615b_JaffaCakes118.html
-
Size
295KB
-
MD5
eaa1b3ff29d64217b70b7f32bf3e615b
-
SHA1
5766ffb2dab887b26eb0a026d3d287d6c99ec4dd
-
SHA256
9f25900c12ab12a806e15dd8ac218e87cd2083c854ad46a4d838ec631e4e3299
-
SHA512
ace96c13c346d3972a696678ccfab506746906148a73150a5d4325109e3bdaeb5e54d78adbefb9cd756d7386b94f714dc3a95f74cac9e50165e4126c65237f6e
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcWi/HAGMgVLm37vwegZJj/TBITmodR1osvaX5njIWaT0XI:s+jbLjsj/AE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000002b27faa64bc31105d9c17e4eabe921ba7f8fb8f27434fd721b5b076aa817501b000000000e8000000002000020000000e2aee8bc51c3f1e6bee1115af58169e6f2e6bdd696a3acd743411577919eda022000000025b5cda37d25bb6182e6fb7b5a81708d0b1db1d95a5751c559ab97febfa1895840000000b7358a239a0a9ba2279a51276d458741c761153ec1dedc2d95c2e6f70ba82d2ea89cdf0703fb87522ab18aa59cb7891e1f17be3fb1c01777b5441326e509f859 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22AB3CE1-7644-11EF-BEB7-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883916" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06aba11510adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2544 2960 iexplore.exe 30 PID 2960 wrote to memory of 2544 2960 iexplore.exe 30 PID 2960 wrote to memory of 2544 2960 iexplore.exe 30 PID 2960 wrote to memory of 2544 2960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa1b3ff29d64217b70b7f32bf3e615b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beaaa28e326ec712aa8b27ff3adce057
SHA1533965131aa0db92012b14cb1029c36df2ae6965
SHA256ddc4d1d09f02f6009fb32fe0e4b0aeed4a45d0b91d50254659f437a48f5657e1
SHA512b2b9c9562c1d143630ad2a1104e287e7f691a50f57b3c49498eccbf14ccc14bf268e8b4e87d6c26cf38aa1eb98658bb1dbc7bfeb92c34ed1e5605944910c426f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1fc0a9996c2dd4fdabc05e3866403dd
SHA1bfd7e98caaba59cb3ceec99f93113f75e1a3501d
SHA2568bf82ffc02df51f25ea1543fee3ec572768047f9dc79564efc54dcf4eb4dcb9c
SHA512eb220f995487779db2936296f5e268080b5c01aeceb9e614e3414f86b890bca164900ed0cab5f8248ba4e546cff03bd296375bc3af4abf055ff30317934a70aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f7e304ebbb02647d689bdc248a6cb3
SHA17ed198140655fb5b4a769855e577eb9151f8e3a9
SHA2560f38baf4b747db305ef25c2cd5237ede8a575da605674815661fec0970cbed49
SHA512a64365a42d44c600b22899b1e7e034f3dd0eefdd43cd993da8dfe81c6d66123fcd4d4745861f83525aad13190fb1f72b88d91843e92417705fa527108be8eb1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b501aeaa861d4913819a3f3211cdbb12
SHA1c516be7a77c41e5f6cf1d7a5dae9ecc52c7ea4c6
SHA2566fc7116fa0485930124850452cba13b562e7c99b7c017ce59106831e422374c2
SHA51212fc60d4e4ae4362077d9485e5dcc782416f484cd6c39781b0a11b20a2c22d71c0136cf18f12624f576ab45dfba81b11755bcb76d783defea612d7a3dc6548df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c561f6e67edf36ab3f43f540751bbfb6
SHA10f0dc9050b9eeb0be04cea8b69960a39d7451b35
SHA25664e4ac788ee219d01b798809ee0ab8fbe6347d55b58e232d568ad1c9d710412e
SHA512e51684068f56677c52439d5147a78cc472c39849b360da7c6d5c0efe714bb7638b9e5676cf8e3e4cfe4199dfc273de49fb66ec6e77649ad6ba6cba2a7c187a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc25f8e5a67f36aa1ee73aa38f391390
SHA1bcf17785bd683a7589983b1333b823fc7e5e594b
SHA2568ade6e63976dbf0632cd045300a1add3ded317022b905e0ff230d4c770a97027
SHA5125b8debcdeb7f286ccf970396c379e5fdbd6cb2e035bae183387b2d377f7194f9064985f04fdb04175188868be229c0bf42ea643eeeff0fdd5a57dcad8b7421d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47490f410ebe560b03623c56bb5c9ab
SHA1cd453b7dd79994b93d7c98d44c2ea0800ad76f69
SHA2566afc13c294e7c829dc2b2c0649bda1687976d6bef8ff3acad533bbb8a860a443
SHA51299835a570623c6fd8b668b2b95149633bc8aeeacfc1ba32a502b28adce2c33878d205f823005c311f1299373b80664f9cdca6844c69faf0dc65422b8a95cb04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9da4a617b83b59f52ee66e53decba5
SHA12bc87878b95be2ad7b925861de72e237dd4f0a27
SHA2560e1262e9829d65417b7429e93ba1e3af8cbbaf85a320efae350562628e5ff5e9
SHA5125312f1d3bf4287c3d01a7e34bef3e3d7dc99ffac54c502d5c4b57c0b32b89ec4c077b68fe79d197e94b32e89dbd43d02a6537c0597422e7c342a97183f695c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2d58b1cf6213a09c96dcfdad778bbc3
SHA1bd793fc09ec13c0e0660add567b5da1d91bc2959
SHA256052478ee4630836db24b7d06de18eeec80646d98730b1672a5017850240e79e5
SHA512122b14e32d22c804dc18cc79b9016cbb3a5c26c9043dda3c6bc8cad8c43b5d42959a7540aa706d2ce4fb5904a3b0cbb69a7f6d21662a6b6450f00772f71c5785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b27a17ac882fab6e3f92869da2d9763
SHA137dc867b388f6434d05c4b2eafa22af6c0983cdf
SHA256e24418fb2bdc056d828ddb930c6b6a91e6fa09d1b52b5b536b1c785811d45903
SHA512a035d296a17d9b5fb6b64c6e124375ca611d12e94cefe61e5329b788c39136b49654a67d62a0f9ff8aa279b1ca41f6123f4f19599e71ad907437904f839ad3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c6bd19d3aee5bf2b1f4a41db1eb680
SHA150b615d6dfd41f699de2c29c43234aa7b0d55695
SHA2560815c8cb4c0cc9a7152dce3c047c9ff358314ce1b517a72e05a3b35e42799b2b
SHA512ff2569e6895998ecf9f0e77fff22f26b68f9c6e7cf3b136a59549f378a9ac498e4c58a495de46389e6bf0e9ad2be7d00a72e59094c5ea9e3278e9091a4ce57b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384fbdaab472241d8dc3e7b39dc266f1
SHA1417d2f062cc7e611855c14a19d21ded8b4725d74
SHA2562e1ceaf0fdf819962853faf8cc5333ad304e0e2bbf61d91292ec9deeaf0b7cf0
SHA5122d937046f03369bef33046b44963f55688bd9da8fd3961d2dbc8d678aff13451ba8ddd2cbbe41c36cb80d1d0de47c1c16ba54daf225732cde9a8232a5301e8ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548881ada540907b7f3e30a087addee92
SHA1e384990afa51384c166b489ed95faf60b149b1e0
SHA256084eeff8cbe70e678486255fb43996dac016fc4cd0c0344ddb3a850455d3272b
SHA512b6666953e640ca26450e32e4c9673d91c5b7816e0d4a479d645f60e9199818e84538e053b9f99a2a1bd8c22c41346be48ecd91c8f4ebe0fecaf32b65ec0f13bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d614dd36d814561bd801d333906cea1c
SHA1c0bf793a6d2d7be0a994d8d3eff8d5c3835c7ffd
SHA256aa6f9df410cafa593df2a338f2dca6c400f9e59a048ca5099a1555d7b8030aff
SHA512707d61b46b6ec05019df6df1365d150482b903021b9f196a25005f6014e1434d209c46467c947d5a1e270ef8fb684892af833f022eb9acc606f4d57f80ed5e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586be84cf5b9a7b15db1ff737fb15611a
SHA1037a4229e86e90a1c79c19000693e779d14a3dcf
SHA256a24cc7aea5212ac808cf20641c93492bdf4e52776d7616e782eb426ac0f09726
SHA51258fa2d845fb05f9e58df0b7c919be5439bf2efe8c461c51100c0924a3ea8d09b28dfc08c5a5377f33dfaa743cfd413e11fbc4c9fa370442d6d562c97055fed96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e29c0164c99174c720c47cfc72b173
SHA100a87cd34260a1290f36805a74aa0f57ddff169f
SHA256bfd388b41131948fce5033b8c3ca9c0ff47027a03c7482a338936b935afd8efd
SHA5125b3e266aca272c4a7b30b8a1d46b8e0106018ea9556ff7b9e44fbce6005ca1572f44d9e7a47f7013cfe60444286c1b1f7ec32bde7f372c96d830fcf7796298eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6190fb3ae067b706ea2c5bdd49fa6cb
SHA145fe1194145df8f6717423bd8508b27bebbb4249
SHA256f631073ae220b3e3f0e98c7a2f43d8baabfc10c371c731669156918dac566b61
SHA51228d06f912ec9a21743eb866d91727899cfde25f9c3af577a6f64f68403fdec0586d18939bedb41b1c6934a3ef4ee817fa4b38622fc80d6b801cf57ef4e2c99e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e519df471da070a1ec21e810c8ec3a
SHA1de780e2eee49329ab3d22bba4152c19b94cff2d9
SHA2567a4a675ee27b003972c06675d78a1495750c3ce4366c8796378b60deeae4e6e9
SHA5128de68d0e2ae9e41c86862f935e632cefec2f6fe6e25d7c4cbdd0f8e20041fecb3e38d35d72989e0fa853163e8888883b1d2fc37f3d75c1f21319d72103bb269c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565fe328a481f4b790817277590f619ea
SHA1b663dcb20a7d8b708cca8bfd69c20ce1d79f5911
SHA256e2959953dbf01f1954bd17f76a21890a9a341177ec3b6e659d28376ca5f9c478
SHA512520746960a01055440218bb6587a923a06c95b3e7c75fa7f16e5efd3e3660f82e754a3e9710739ef7be46049e803ad8eebfd4e65589e58c5364cae5d5d7a8652
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b