Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
eaa55e7fe8d2ce5146fd358d3506dec5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa55e7fe8d2ce5146fd358d3506dec5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa55e7fe8d2ce5146fd358d3506dec5_JaffaCakes118.html
-
Size
6KB
-
MD5
eaa55e7fe8d2ce5146fd358d3506dec5
-
SHA1
5bd8ac151b3195a9398477f24b4e85e1c4d75c84
-
SHA256
0908a8db110c432fd50757e2de0adae7099a31c26ab100aae6a496e2600d1323
-
SHA512
8eaa4c27143c56005d44cabdb1e4e0384bc11dba6a3f5bfce097934f95f12577280209f97c3f6236bde582775b6d658c798ab817479f04426f9c3d22b81c0d7f
-
SSDEEP
96:uzVs+ux75QLLY1k9o84d12ef7CSTUBOcEZ7ru7f:csz75QAYS/jb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000009165f7883b5b9c1a06ff83682bb30ae4df41629cb51885ba1111046171af3cf2000000000e800000000200002000000091ac2d55ea585ea4f223e038962dd664bf6ca75761efb02e2e9c61f0eb74dbf9200000002194a0756c39ab93ccb0705212e7ae7b7325d21a878f1426689774df9cf85f474000000086639f95a65c982043a149c1bfccc435bf0151af3e9e47355192320d5dfe9b10add223f6cea0ed02ad54635e98985399c8122ab285ec42ee03af22e043a46d01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884517" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000f24962296d8387c0e2d47f0b5fe0138a442626322dc7c0e0651df06bae0a3bc3000000000e800000000200002000000005b56bccb183289cb67a933b8945df323bc95195389977d21e3f503b49d7ab419000000096ff25b341466c1fc3ca68952b666df93e3e3e799580a580bc3670a0483012feacc94e110d452e02d06f88a1d7f9c754a59eac3fd9186dc90fa99d9f80d295439195e1edf57a289d03f367657b577faf1203635431850114a990009e681e85516f77fc4a6ac9973742b8340b084db8133fad0dded3c91356e577574d75edd20ca9bc7da025c152baa787a2520f64491c40000000c9f26926af61dc0e1ae79204ecd5f05675cf313770519da8798e5847963a71c6a821f0957d81f347a6bef4dffb3a5b207b3950ff46b7de4b451dd4a40ed4207d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4029855f520adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88E162E1-7645-11EF-8AE4-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2696 1732 iexplore.exe 30 PID 1732 wrote to memory of 2696 1732 iexplore.exe 30 PID 1732 wrote to memory of 2696 1732 iexplore.exe 30 PID 1732 wrote to memory of 2696 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa55e7fe8d2ce5146fd358d3506dec5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810be5ef539e7dc99e6d399bbe07b09e
SHA131e304b860bfab97ddf34ceddaa9d8e1cf769c1b
SHA25632dce7aa9e9d7fcf9f2d3fcef4c11c721eaef4a78aa997410194d53f9ad188e4
SHA5120665c73910e7d996813f8441137c0ce74f7c626248063b33f4dbca03bcf5c412f36af16f6a595cf51993c6546bbf25bc0fa780958df6cc053359b1fafa7d172b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3014d12940a41e3e45481d41010bd6
SHA1d5f03f27f0f9908a9adb596b0327753a9aa09752
SHA25600adb77ebc53e7db74ff4da5f557342d884bd5e33da0562f61a065ccfd652f5f
SHA51246624e9d347d3e4570a79e2f0f80c2b59e724eacc7c013bf3cce92f714f2ccab081d3d8d873a52821b2251d3f1d32a8debbc48f07e6dc950f9904760e5198479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5154383e16f3ec66c2789b8fea7b69c
SHA16c54891c40a353501e9e819259724351bc13da84
SHA25635f24314a9723fb5efae756b4226608aa2f479dcf79b80de18186d9920b01f91
SHA5122391702477b738b38fbed54779b62da85e9bc6cdf46ebaea93e3894c028b65f2f0d872af7df10197e5c257fd256e8f67d022005fe54bf7db6d3f36f552ea5003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f02feaf7d7ad91f9bfaaa6c1704e19b
SHA1794c46b7287e3ca2b8948409c59939ae2462e8d2
SHA256ba73f65401caed5cd23b626496ea367b363063f2e62b3c3b2e5937c2514f9810
SHA512b0741961c2e6272397fcee5049a307b20148c02f57e29d5f85846c86c4c78031291bfe68400dbbfbf529e7811d53e51a901c88543e4c05bb7394bf9f94056c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1388f23cec7fadef07cf7c86de1236
SHA1f6cf7d667e3eb44482e3cd197a23b42dabfc565a
SHA256fddd951f1c171745db7b54fee788a51a794ec7a71ba6193fc6e0d6a480445382
SHA5124e609e976726ab2157c7c73f3ec3adba3dde6d40e6dc2d8db7cfa930d980a1fbe390356349feacde8b2745fbd14b45b92366f4944f2a51d0e56cf705007d61de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e14fb9f9bf7792cbdcbce4161c326a
SHA135fd77787dc5c78468ef2ab01c1ed3da06f6cebf
SHA25607bfdc96152ca2b503bce6559e05a8a4902bd1069b1853d23430c683f4020d22
SHA51267d2ee71530e5e9f0788850f723d783deeaadfa4589be342db83ecfd598115ae334da8c140af25abe04e9fc05a348c8e7b049b139d307537e48ff8189e829a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68eff959c5af99a057e4ddda2b89025
SHA1851ca76bf81c1630b2ade43bf5f761e1d45c1123
SHA2566b1aab72060913545cdb20d03e625b801ea12c3d75065ebbd19347d8e4a912c7
SHA51207fa943ff9d34a1eca1a3b230870f339474ad87e1a4092e5d9dd82a263e7815c1e3de4b467c3585f5534c63e02b8b9b17b9212510a0b799a5311baded139da19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b076474f0abba45c7903bd6e4e78084e
SHA19342c4ed1ea320bfe6810c07baadb043e9eaebfd
SHA256fbdc1756f3e22fcac2a46fc968e877aacca108e75d131606428f8c78509307f0
SHA51215f2cb35b7e56267be2600e339bad96e8a45e1b4c6dd74bea22e30f455af05ff69840e45faa3ff3da758a436f59fef89bf11c85d5ecf07bc1f5bcaa6a9030383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e410c1a2cf7cef0d34d8be2095bfaed8
SHA15864dd28024fc760158ec7176b1e64cc2fc4f70e
SHA256ed907d97f64c07d6cdf18c5f36c0d3efd4c1a625fd337ef4079bcc4a21ce556a
SHA512b4ecf9974e3adef336ad08dc2bc8f511929f762a478557973d788c268ac438415cff4055acf7afeb8a9dd9cac22f24ffef92d5519366a7e3b759daf6d36318a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba9fa9bedb36df5789171e9026b4984
SHA1807a9cadee3b3af8504e07d435d0ac82e7bfce8f
SHA2561ff098762a97461eaa3f2bb0b3ee02cc9832865943195f7f3713c123dc783ad1
SHA51205bdc50bbd889785f7e43e41a3904801ee075f3f70ae17a116b46048c58fb7b179ed01a1617d91a38f7647fd367644fc8297102c14e1b1136619587686b2e577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29d604e28f9aca890896c4f1919b0f7
SHA1b3a161e15f664a3dd084df70d85eec04049a1471
SHA256548170eb2641d937093665e5f66b8f1fc5a3f89fb9a0f3f6677fea243e03cb00
SHA5124fe84d68c4b907197797cc110c0f5903d6283a31f21e8da97a3b8e81ec79b88460e42afd93a88e4ea0bf4bfa39fce58d83bcfe5ab4bad07daf209f97ab0b6237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8bbea624e48e20a52c745bab315431a
SHA1515570225471cf1e12985a2d8958ec847a086a03
SHA256dfc2a4ed3f97e7d4ba76049e945bb342bfe8fbd2eba003d2ecf058f262d3b41d
SHA512712be8d3d5823fde04c5f90df5d979109a1aac0b7a1963f1ef6df39fbda97d59e1bef5269e6a29226153ed14a9c925b3f33ecac3257bba5b65bbfa9d49a20bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e66c73dd26dd2ac51426108e26ece02
SHA1c55ea6ae71656050f075a5da3284d15137fd464d
SHA256dca44d5d48bae3bce7323bb164ff90ba3590749ffa8ea63480b874f5b919ec16
SHA512d48094cffe2911e9dcb1c8ab6fcf4b1c0e90bd7d0deb3e603e1812af7a9f15005f9e1fc110ead3b3d320419fee6bde934c2bd97daed5e03b16d502d7194149b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ad5668d56ed8b34d153ef46bcada62
SHA194f4591cc7eb365cb6e487055caefc12cee39afa
SHA256662897a9fed12ab1c4e12362c25e309832c7a7d99e11ce42e780d2ecff114968
SHA5122231ce9cb86e6ccdc3e7699e3e9136df4058a79a8e2f9c85a14347a27300570d38d81f87a0516c8f4d072596b1274f5f7c901ee431028f681ceb4b41cbbfee65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53855ccf5c45803d14e7d928b5ff757ea
SHA13c757666d2cff35ff29e28723bbc3a8fe77a01cc
SHA256022460b9f06ffdbc67012666e8d46f33628b73b9f601b69d77aa041eea7c808d
SHA5129e217b077059c6916a46e6cbd278bba511bf7f3d7280dfd68ae1968ece2a471b74b5004936bdd8282494105a64133065bf024ff9bf1f24badebc82a37af445eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c3e1532f2cbce5622a7fd24dc7a69c
SHA1f8e67906bac0a237e915469cb72922a7e471427b
SHA2565ba35ed747576c429cc104e09c22336ae2073714be34193361b1854495e30a28
SHA512f3d39b8f28f58d3e842e69bbee9b5453e70188f03135728a29fe7a22032d881e70a175eedbad1d871a6923e536583af958c21057368be3b8dc98a7cda0a99cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02acd5fd05ad6777d29b2e18acdbf53
SHA141ef1ee8457f5336f9210fba2b07f2191961b7e6
SHA2562abea280200dc9f6761e51d99ed0931019b19b616ca79940f14717a4fb9b82b5
SHA512165817be53590ebecda00c25bb61352549d4051e2323a9f97d282234654c94259a74e0c8a4469e9d266ca61978f257b946858fbef362250dcaa74dc2c3538cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554d55bdfd06eb21a2d3ce1b7be7067e9
SHA155480156dff773c0d80c831bfbda02d41657997a
SHA256ae7553bfe78a316687b782f9e4a19e51d81d8cf779e4df07d2bb1bce255343ef
SHA512396699967966b503286836c26be6293d897256d1b4a1cc7b770fee861283160078aa55cfe33a9a7b79c4ccf062ae65310f8874b5967883a64288c27380692604
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b