Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
eaa23a1b6f23559e4d74ba7fd2f4f84b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa23a1b6f23559e4d74ba7fd2f4f84b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa23a1b6f23559e4d74ba7fd2f4f84b_JaffaCakes118.html
-
Size
18KB
-
MD5
eaa23a1b6f23559e4d74ba7fd2f4f84b
-
SHA1
e2f3003453dbcc36f00e54f05f224a5a92e7cf57
-
SHA256
da31c3d172f772bcd0ff6e0cd7576fca3dcd78b3742729ed8c016f47439e461f
-
SHA512
4533fcf006b52d71b31b4f7f12b44ea4d9e55023ca804d65c2e5832a170398b4761580ab908e56531a5cb364e56879b85ec7b42b63a4e0fc27accf873910ecc1
-
SSDEEP
384:yFwKdRnDRAooRub0DQvrErbG5jXvXpOx8uaR1MqAkxZ/Q/HEMb6hP3fhzLr+ybYY:yFwKDDRAooRhxvG5jXvXpOx8RR/voHE5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884034" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1090eb40510adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{67E2DF71-7644-11EF-BF4D-465533733A50} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ad636a0fa06653feac00f1ce8f49b2d20c556b8c6495fce0c184a5049d8385f3000000000e800000000200002000000075a13ee31d5aed1dbf1f10643300a72579831dbbb1a9ff69c45f759777daf2ed20000000bc7763de52b566f4ab04ae998a7cb7ae0924dcde9b35f3ecb089aea5ee2c52c4400000001d108370b69b27d4b7d3a17f0b6897d4bcfce6d4ea1e2ded4658156fb0196f71a2a97e7e2fbb99764da070b3e1277b80464fc89c1b074691361ada21501c6bd0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1716 2060 iexplore.exe 30 PID 2060 wrote to memory of 1716 2060 iexplore.exe 30 PID 2060 wrote to memory of 1716 2060 iexplore.exe 30 PID 2060 wrote to memory of 1716 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa23a1b6f23559e4d74ba7fd2f4f84b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b03baf8b7257b162f757f16905471a4
SHA14e4b418a096b5a0359458f5a0bb759a73612ef24
SHA25662b59866a3d4e82ba460d2744dd216b17aeaa604941cfa1f1e5c35059d5228e5
SHA5128330d21bebcc1760434bfe5856c22420b31833341e283691c52a08a7660dea8dcc17c4c59cd03a941d5ecdc87c389e25bc400b7bc75b16f23743ea64d1d8d09e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f427e4242207f0a028411c1cc6ee3b40
SHA1740bea58a94c9bb51e4032b498aaec8e3d7a2845
SHA25652459ee7a572f2dfb0f655190c4eabe61c750e238049ac165a901bf87077e3eb
SHA5128e36ecc71ee3b75dd3b3eca06150ef113c576fb349c97a2c9ae02f6753ac1bcc2f0c95813aefe66b742d25570b159bbd53800cb1ebd868c69cd45be8180b19c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584128034129bdf3254bb106ca09f347b
SHA153afc6ab53e0cfed8226eda158a983573dab5006
SHA25689824824a8dd95799dd363a1bd284730a1506284aae64c173da76b166b0f280a
SHA512e02c375aed3c1c798972d40de6ffef4a5d2b46c1d541f5327d649a44f3acf6fddf7a1ca5233a78c9abfa3ef6056244663490a439e9b9bdf82a500cfa59a7a13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deca4369eb2983396429f73b42071a42
SHA16f8779d9d19b93788f0fa48cd89686b75721184e
SHA256ef9b54e177688b17d42481dd03e867609b659136f6d6f9565e9d917ee2b72f13
SHA512afade45a81c216d687e2441e49cd51b731cfb99a6a6d99d5b61ed3e2dc6ec3a50018326637bb2b30a1e4a7d5e7c1308f6b0485ef057e7fa64ea48ee013aabf7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ddbb2d1136aa6b6377b4c05fb44e1e
SHA1a953b00df37f29ec608f4d8ccfe218949c76ff2b
SHA2563b9fba0d4e8db44d6457eb1f82db71c571a85f1ac1277db6bda24b5cc08c2b16
SHA512260fcf8e888c12689b1c13a2bc7bde5795a952aeb0fe3ca2077900058ff1b2ca703571b359ca60ea40b914c4aa7b25c3f0f8dbc478162758223618f5f210ab06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ee596a3d1712cf9110e11050355b6a
SHA1f4c3cca3ee0f0ff38d141ce8af7eb05c9feb7475
SHA2569d2ba7852b36f02c4b259d80ecf6ea374358012cc7cabb8c55d88e1bf21c3619
SHA5126168c58835f5bb35e179b11fdaac63e8cfa53f660d972bb4dfa352eb31c903247234dd896b0cd3a057763ce12983a5977fd84482576b746eef578c6fe0486096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeeb2d48f4b4216cfd3f7171a7f27061
SHA1733715f16b14108aa22062da6bad8f4c1e372a1a
SHA25658f410bd1c7db362d048a81451f5b6532f9cec15ceae1b02269cf0b7d6c17fcf
SHA5126a5cdbe22288ed20995e21d09f23b1c26afb7c8b401b7f60e15b93c1b4a2cdf6a510475e3de4e023a349a970fbcf28b3cd5379f350c8970d3b9fe6f67390f4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c88b86145ff685c4cd4819ed5044b05e
SHA10481361bcbd8791e863b4344290a338003bf6c94
SHA256a04cc38e179a0633f285dd2913039ea43989596e26e886756f895699e68ff968
SHA51282518fa9d99933c7c3c2e923bacab4ffdb9566a50bae7fdbe40ef1adf91c7df54e637f18d9990ec670b45a4ac962bf87c69e790b73aee21a83dceb41492536d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ccecede1bf5e5661af5aee920c5c87f
SHA126ab8f885bfe8f0c9c1fc222fda29a230e1163b9
SHA2560db3390d673984f0c72a60ab79bc14dcb71f5ad3799f6e6e23f2ac799ce16856
SHA51227a57932c70f50f2b72fb4a6892f8e209f8ab374fe9027b01b5cbde15d52d4fa8551aff1363433d6fcae4ac4c90e707316767b52e96db3a9c74bf93f7a5faafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7c4d7b35aeeeff487871b4b1674188
SHA1e556c02934c779aae75d83fdfe3c537c9b99d91b
SHA25658f1067ba124f182b46a59e665ddfe77d4163e94240dcd137a8d849b033c7f5c
SHA51230e62bd3846ff0821c26583453f004833e622b2db3f1d9ee4b8c71e8d1733ae80e859e97e1c1375b5665a76da31f2b1634c30b6c5c0e325756f37574116a5552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56618ac193c22112339de1acc9c8725d4
SHA15fa95eb3fc2528f00bf87ee223d2679a4a81bbee
SHA2567d31d61b2acacc9b5db7d40b7e12f910e0fdc2114c6265931da1e41e9ea198c8
SHA512427f1cd75480c40d6d641bf75e901801cd0aafef192cf42f2f08a59d7ed3d79c2c1b54f54ce90067043b0cf2f94fe6ef9dd9a48f735c95ed7bdf62e0d856926e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c1ab490be8a769536697b390da6726d
SHA13640b4d8a106b788564066457cf32c590fc0c54f
SHA256c133bd70d6bbdea6744656c13b1ece4c91953de08ae9e9f3910e5b48992dbf2a
SHA512173a1d5334e8959493a50624e7852512102447c95e283c478183869bf860d6268d288af72d26ea039e61310d27c2ced29d801954ca99f3085743e8cce595d0d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d66bec25b0b942104363df6b7d63ae4
SHA152b431709237d12803f5d32d1f793342f26002fd
SHA2563dd7e3ad7ca1f90e656ef292bc753e36507ae767c4b6281aab0189413507c2dd
SHA5127cf0876ca39af6fb23f3969e3975f18968b4491a9fb1fc086e22554efdbdbd28433dadf2b5dc9f6d2e8d6120c7456b42bc891e7b11dc4451e74c361ca4c9e4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2edfd68a38f9d9d4f4c7270eacb48b
SHA19c385e251a9d368af317cf5e65611dfc38b8ee8e
SHA2568415bfb85319cde8a78c25ffeb1f02306f1b2dd4830a12c8236ecc89d2c47ad6
SHA512c9bdba1e655e2cb481c9c8a2bf6bf462f74de077f81a07d74bc27b42b0beb9954864a4d35371e59fc3d921cfa1f6cb3677e285ae81c2b8d78d7675a1f3e796d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e267c78ee3dd6bd167c7b2e52cc5e26
SHA141f2109b790f38a99ec4b453c8d6ebe9262460f3
SHA256e26b47b0c11b30f46520511680aa4e77e1ec9311e58416f401e9140c765eb942
SHA51295674397570b632c1f94aeac77517d48f70767492ca17f0b6fdd02be85c3180bdac1c8b3c2ae1e00d245be35874bd6a3ce61fe53d4746b3daaad4d85bf653338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d8f9300bd79958424faa2c70c55cb8
SHA156c08afbd301158aeca0eedfccc97d994b14d2fa
SHA25609eed087f95df7f8f5e91578449cfcb6ccf3610e0fc32ea9364a18185283703c
SHA51211941526d605ffc53c6e8ba10b62642ba50568c44b486c789a7d04aba3e8452b11f31c7a17e7fae9bdf4fe653a046b140ade94fcd8e62a7d5b4e3d71df22358e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a30ce11897a18d4ff92acef742a5f2
SHA101e866eadf21fd5764e0660b7866dd03e5823715
SHA25668a6366b20ac5aa9736115ad871e8db0a608b23e71d03665ef84699e1dee2811
SHA51226c406b351149b322673d1d5f78e9fe1ef19f40a4ef11a5603dcd913c49876d783731eb2c60480c791822053016d842bfc954a2ef3de8d4fb22d6830e0dff3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2342454b73ba62df3f7f967d1089e89
SHA16ec0e787ad2b196bd25c7dc21a19c3c0e5a43690
SHA2569ad6ace6db7cc4f3e90e81df1d1e619c5026682971d16c4dd2edeea01956d074
SHA512e0ae2e11863d6ea55f050aebedfce5ad4d6b95b491a9e3aa0a2c8d757e4872a0d4f1d1f0d3714c996196eec9c029b4fb34a26cdb6f609a3db0856a0021a3dc76
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b