Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
eaa2cb15bbd5da043cd54faad651288a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa2cb15bbd5da043cd54faad651288a_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eaa2cb15bbd5da043cd54faad651288a_JaffaCakes118.html
-
Size
19KB
-
MD5
eaa2cb15bbd5da043cd54faad651288a
-
SHA1
5f3d306105f42a0ed6f86c8b8784b626219fac77
-
SHA256
2b9f00e0f671b1a5cad44a6579835e11018efe7f26686dc56fdbe5e9c1b6cfaa
-
SHA512
59544f7b9534980e7f505606464d815f4f543e0288f4584cb7d519d5f9c51f941dcd5c9099b23a77e67a673c707cefdf069e6808f26809cc8dc43890c5c004a5
-
SSDEEP
384:StKBR2NcKiSnhqfdMjgD8mFmgo8Bft1jdeYufszPdXA2a6/2/5exN2k2uuI:S2HtPKc8mFmja0Yufsz1/a42/KN2k2uh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD97D021-7644-11EF-837F-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884148" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 308 IEXPLORE.EXE 308 IEXPLORE.EXE 308 IEXPLORE.EXE 308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 308 2460 iexplore.exe 31 PID 2460 wrote to memory of 308 2460 iexplore.exe 31 PID 2460 wrote to memory of 308 2460 iexplore.exe 31 PID 2460 wrote to memory of 308 2460 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa2cb15bbd5da043cd54faad651288a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b9dc6004dd2a0dd05a4e1781b0ae32b
SHA127d26050fc22a08b47665d8a2ca398997a953b9f
SHA25634b053bfd62bc2664fafd5649497b7bd713c03e6ac4fe5a99bcfd6cb63319df7
SHA5120799dada7dabd53857b74e01ad869b04b52aebd2bbde6e81c2dccc193f693510316b86409b2371398c1463479ba1f8ad25b7591948e334178b7b038513ee489d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59480bb3f6c97c78845b44a2879a22e22
SHA10324876b6bdb7d578ad556e05f571436a4445518
SHA256b84f2be9600bf08d42e7e5bb6c30c0b06e7a359582bff026fa175c68a12ee5b2
SHA512403b9669b2479ac7513be425d1ec62a2812452ed87eced76a6b62da0b3b26ef0434cd0315e23b57c9cf8ce122506eb75c68fa063739842580539074b66528f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291d8ea58bd9bce2340df8e62a6b4273
SHA1c129cb42e6fd62f7c8d5bcd096e73ed4f2b50832
SHA2566c2ea43a79edc47ab049ca0018f810b8107a4cf0fb5d0706cd43abf20509f198
SHA51270a90376fb280bbbd76a5049e7dedfbbf6c466ab36938088cdeab12c8502107c9a054af07ae1425d70add7f01a43fd392ddc17e49dca300a02a002fc3c6c4c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553dfc2a601ee642568788b3b3b85ffc9
SHA174136d30c8680ace5a738288276eddf00a320ca2
SHA256c8eefcf12cc1f37216c3bb9409d5f386bcba9c314f3ad082a55764ea56276ecc
SHA5128097a9a89483943ac5bff3076d9c6d1537a844f9570dca0728f68514e2ecb1d9c0671d7338f01829efff5657683841d7ee1880a2e82980ea621d63633951505c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4d76546ff234ce5ac7d4313a9f9e77
SHA1a996328a431380f2aca258f5656759ddd982a72e
SHA256e743d7a6f61c33e6c71cd1665bb91f256fc282607c82edde5b352688450de33f
SHA5125d37d7193a2ffe99fc6e1f0a8c4c10e06c610a660c8f7d987af515a9ddf1e5c8a498e219e4c0307de95165d8c3aac10d0d3a9f1b0b44cd45a771b21e23584286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5fecb155ca44e3cc43009c63ed695c7
SHA13b1ed00a6677122a090e00476cb3b2096f1f6b8b
SHA256f5efde6c0aec5bd9397df7b8accf057850d4d7bcbcb9472419cc9263c886f84d
SHA512bd790c03175d91a7cad21baa2ba7d3fd4f72adb0ed9bf8b922405ac028504b492a07ec959b0ad9f86f31ea666818c029426ede794d126f71edbddad2dea5c46c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5737efa48fe91f5aea3acd9b25d930533
SHA1857fbfe1885b2587fa7c9a1153210fa7fe0859b9
SHA2561c09ddd3ed3651080aa74ccf6e347f21fe01b3d190f0dbdbcc4c31a69a9ae9ac
SHA5125a7c65ddf0a3f55e51c07138012af7d78008c35e2b70045b6b87c658f34a3b44249ff1d3d20ab9ed70b296e800abb774f310b40e8ac20b1b82a4aa160be0736f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b682fb72e322baf513c93ba27c3788e
SHA19e7e43b84b2914dec1a0689d94411970fc3e17fe
SHA25628eefea569aec9d9073d7b1fcd241a227e44d88b9ac8b073a8e75698a1bf4093
SHA512fcff6ca0c13f3d8d198d787f19964cbdc4102446d198817281b2010b2781c499aa47a235172164256dd9b332778d87f89301a02876bec98a688faa0f3a240fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eda56045d9d8821c36d204b3186502d5
SHA1f4205a798a8004c5b985253aba72e1c1b634b8e6
SHA256fbf6e34644d2251cd5e703d130eb536fc987215a257021272194af2dbef333bc
SHA512142c18b00dda05d8d9aadce2b3cd157577b7dc0328334bd45a35c4d57f20a0a80c5e963dd5a84eccd3ac4a2cfea372baae506da4e00110d0a32b54dbe08bad0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589fa75103a8aa53dae6b7487ac66633
SHA1686486b104564ab69ee3798e2af5c6a1bce1da4b
SHA256b5050241fd11d7b86759008f41b94e70045fb6dfd87703606c5248b521269792
SHA512e674aafaf12b8a71133cc67e5f5b52af524de825166f2532fba961b2be3fbb38b250cf684aa27c855748587c6140350733ad289715abc4078e52a1653a51d20d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50738bf46d3903cb89e169b496038138a
SHA1030f92c948b76faa9a18aa784166eeae6850d511
SHA256635739118bad19c7416a7590538164c6fd4591d33bfaaa5e04e14f4eb1b891b3
SHA512469fb229426e0d40a2daae05e1bc4bed54ac17ed64b10fdf138cd57b97ac97e1faa3070e3b44a9da389ee3df0bbd980cd6b28774e5255cb68ffe6e49e11a7d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b2a3532881ef665eff3d4a462bcbc9
SHA1344b2438611c99838cb692a3551b83db186aae79
SHA2562ff9d28a96994b3c1a237db80d1fccbdcec1f217c1bdc29cbbf8aa11f15a59c4
SHA512c726ac7e0bed611e47d47c99b59731f16647d8bbed59cc674eeaad77f90a980780e448d12968b80c8ed57a88b71d5229b98ce098564dff2990342ac8147a7df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e6063b69677a349182b04f86c3ac9ed
SHA1fe780ed90b71af454b7d199fc9b84ecfbb291cbd
SHA25637242a576c4a7e65f47b011385b961ed479d6e778dcc988f2b9beb2896c8a8ea
SHA5126d1a81002f5a2e655ab9e6501aa830e200d4fe9d97c310c89b2067b1c4673eccb41612daa12311d365cc602b8d9066d7a5013168d11966a9085c2dd10feb60e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9ab44490537f5177864b18bafa9ad8
SHA10fc4d5e34e97410f7da6a88a5c6f2f880082079d
SHA2566fd2f89c992e16682d3a32ae983f024a7643709b0e3f9e822b4469544dca7f81
SHA512a57d976bcb8456bb31ee205afccc8387160f03b3a062c64b866ec7a114e43bca0904456e2b395514d633366ce619841b11b559f6b15ca682c43b22bde28eb910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db4567762e870b2b4926b321baa8eb9a
SHA1080c81935d5fbfe8eb379dcd5f5055dc6da9ce56
SHA2563b3e3e6de88363e4c2aa7cef1519e4fc2a17abef1ac71a93cb8f88d46554f0d7
SHA51224a25221f615caeb06082fe5a8846f2fb768d47b6cee00acc669f8cf22f07fb9170c9f40c7af52c2df5912de4801bbfc937ca6b43b3d7c05c9d4d7f27417d5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d1f83f22190760fb0564c9e43a9fe53
SHA13da668e8d953d803d3e61d9426de9ec7ee4783d2
SHA2564b09b72ce28e05baf8707d65e5d8082c4ee1f6d80a3ed0e7a534b37651f21b03
SHA5125651abc114dc6da64d01c46c8321407cb30ca54dbbeefc90e6f01f3bc7931f496fe5ea25ab29803bd5a3daa0819101b38c84a1e4417ecc71975c2588d92c070d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511aa238e1c145768b2320964b3ae5d13
SHA1c665ea0ecf0b09cf31f03d965d4d46384a584480
SHA2565961ac360ed55b3de1073a9a965b8a582e471edc525c056276d5fc75f9048474
SHA512423783d56ac93c1720757c55a167127b6b4ddd050708e83f2bf30209761a2d07563dd623dd673f6e5d3afd1f655cc1b645fac82745133cc11ba81d3466a490cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af3e797abe775a34caf5af45894e25b
SHA1e7101a371a858010201c6feb01fc885478619213
SHA25650c36ac901f17c008918b7c36e117c69382994561ff765908d596104a72cb815
SHA512bd2ccd7d17aa33cd0abee738e88122c6d78aca6e7e79ffc5076e6426a2c64ae8ce8e24273b7772901187d204bb0b7c7e928c16319c3b2be7641fb7262e094879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f43eff1340af025b928fb2d9aa4497
SHA17179122b18f9d711d1f96dccc2dc8aaf4ed8590d
SHA2568bd13a236aabfb898a5646c9d8628f0544b9d4fce93a1865b880b5ef2185e2fb
SHA5127ddceb9aca8ceb9d9abbc8cc27cf02620d1780e26ccdf3975ad831b8338134d20f32e70a6c020c5e7af97055299cc3a7f57cc0c87db300d2ab2e1fd8653d9f26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff0655504628c8e1732c8a9f6a5da27
SHA1e20b49f4a2cfdaf1847dffb2875899ffd30a7dcf
SHA256b5dd5718a4f458957702c7e7dd1087b13004f6417958c291ed9899ede13c4caa
SHA51247ff46732728fe4e00a636319c654892b0b1e9ca235ee81a2e3ed0ff03d8f1fe082dd9386d94538edebe9a8a910c660a84a7b46c9026970da1eed4aa83ba6583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f8c42fbe833db5bde6702e4bf42c690
SHA17190e2e048cf7c5d624afe21930e4e27d9a918c1
SHA256e4d1ee3bdbb3720e4c5603160db3ee42217cfbdde223394403a56f9ec7fea84e
SHA512f6af42e82a5d088e9da61ab8a6474de5139ae5ea876f7c16be92eefe6f8de3a551541ca11b572a1080eedb34faf9ba13b478d6c6ad18381c67c5c9c16ef8e080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d07e6a0bde3ab7eb9784f325fb51aa0c
SHA1f731296cb38411122a0c942fe6c618842306321e
SHA25663a52634023d5eeee7451dca8565c6972a6ac4b7239e0f486eb4dec7ce722bc0
SHA512d41c6438cc5ca8e00921ac8dad376f2f9da22914c375d541324de1283e5b946f9f1e8458e3f61c59a7b01ba36198c4004aa29ccbd771c29190f55506143af617
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b