Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
eaa64a03b2bf06e96f778d93a0b7994a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa64a03b2bf06e96f778d93a0b7994a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa64a03b2bf06e96f778d93a0b7994a_JaffaCakes118.html
-
Size
4KB
-
MD5
eaa64a03b2bf06e96f778d93a0b7994a
-
SHA1
62b2aa65af3f87b7abfa7f52250ef4a367b42014
-
SHA256
f247e5e2d67d18ece55f906be8398f6a06b2503adea58cf4c129a1f45795ab3a
-
SHA512
ab1475799d5e858e4ecbce3c081deac4da31a9791ebd287a7dc59875b6ee3cc58fdb8890cdfadd3e2a1240b15dae605b797e50338acef4526b5f58288d17aee2
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ovqnad:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000bda5822652e2633454063eb872f679b3f9ccf213c7b67c3be9af6d8d86328a6c000000000e80000000020000200000003c9e307f6b3383a15616da9b8587898d3b84ca7dc57385bee2db1a7d2664ba1a20000000965845731efe3fee540ffe2c95223008a92c39ec513d359e4ea32e2800a4fc0c40000000a4704af17f9f6f517f94cfc0efec5872feb6a7bce5223f49121718480ca96bdfe27cf0d5d658c744368dc6bf751270ed118ba673026e00e52e39e5024f9d62a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60efbfcf520adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB501831-7645-11EF-8673-F2BBDB1F0DCB} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2144 2924 iexplore.exe 30 PID 2924 wrote to memory of 2144 2924 iexplore.exe 30 PID 2924 wrote to memory of 2144 2924 iexplore.exe 30 PID 2924 wrote to memory of 2144 2924 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa64a03b2bf06e96f778d93a0b7994a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5039b78ecc550a36c094b1cb62784ca46
SHA100a61a633b8f3bf4071c03ed31fce971e1ef59d9
SHA256b0a667db9b6b4d19e224bf6d31dc328d3c1fee735d6889e22b2c61ab88ee5a3b
SHA5126d27895835bc8d171c3c999b3406c6e84842421f97715ba9137b1de7fe0807b4df7f7c2e0d4e02dc5542b102962d798395d36efc663de3a4e6e98e86365a3b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52909c6cf33ca35358df3172545ed03fc
SHA1922286837a0e72bf444eb779df74b325ee8a9b70
SHA2564c3c8d711d11705ee4c70e8d2f5c5b748665d2cb97ec544d215ee01c967248c4
SHA512abbeefa75497d118d696e6e3cccbe6467bb9f985f0e60533ba9359450986562b712810e855b5a0f29a4303583cca73bb563ed334e2adfd7898d8591c6ee45f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f382f0522a355407a3cf0fe0b7c9e62c
SHA1a29cf29d82fd5159a3b5afc6c22ac83da6cb2cb9
SHA2569c493a7fcaba2b5088bb8a586f48e9202714e3f04ac3dc4970cbb9be032df4c9
SHA512cd09b130c1dd6d998da53a9dcc3a94a49556c418bbd4e7b86d97d19de15214edccfc282c8341a77ce3583a7bcd0659b681bac7b70f6910f185b0ac9a634ac4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52552e79d78426cb99d0de2631af4689d
SHA1bca384b738aca0324b4f3695b4c2edb4bf50d481
SHA256cce28412447acc9639b88a6e5f85e6b366e38a64fc9a61f28856643e9005610e
SHA5127f661d94628e60cf3b615f1a7cd3c852f47a59daf4a42aa910cd3d52e21f563295c4a10c998387a94edf0b88992d87b20f35901e2f0368107349485a9878c76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596561426782fa19804cec9209fb46a35
SHA168ee736b796980ed2b41fd4910aa423787c125ab
SHA2566a2fc4cf70ee87e18920c8e8d817e00af7a2887e1c396a51ed2945b214bce3ec
SHA5122e0bbb9f84e348b9d7bf7eb21d6605e5d012f5091ea89a327ea89283f14d6ca4e6839b25bd6e52babe929cb4730dc8dd5a0cabbde8351111ec2d176d2467fc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d96272c2468950d6a5ba2e1e0621dd
SHA1276974bae357f4f0cb77122678b0f27d26249a66
SHA25609c131597de058284be937dcbf80fa5cba3bcea25803fc108e39f6d3b3e282aa
SHA512d7fd702a00ac3dfc8315276ff12d4b85ef377373476e2ff744458371283b918830b1c73f81511e5de0322e64f446ed2be8d56f79be2b9266bbfabe3b03b6abdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ca082f54ed02e85710fc76fdf2f7ad
SHA19fe9470930deaabc17fbc4d39485625f240850bc
SHA2561e4ea7711b160ecc5eff6791dbd41a0c579455ca1f91dc85b14d9772404db072
SHA512063f5ae2e3bdfd7e13d15ac0449dbcad4f72a258332ed6ab58782d88dd5e4b0125f164db9d9517796e267ed870699c17521b87de0b28c534d3fbed6fc428bef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559dbacedac6e3d5ea218439bd594f991
SHA1fde2ce1d64ad29084180af106c2afb4d0360fecf
SHA2567f311ff95795325c7109699286baf1f262583833c31ce948d7c2780bc9875e15
SHA5126cc9d0b98317fecda3b4ab90af67d480d2f3ee21ed587dbb4cf4b7d392ffa70b918e54132212ac3871f956f629b67d26d208ed44ebba5cf2ace17b79e7646132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583aaba6f821a0244e1fe65173c5583a5
SHA19ff02f9afc1f645cce628c2d94f8519b4a8dfa05
SHA25699a42eac866b974538e388597b9e7cf745b8733eba12a8a15b8f46968693f69b
SHA512a96b4eba5260156cca006e2ac1997ae786762a304ec60e2277d97bdb7606e84671220a01a3f3c6673c81296679e81ac1409faf451f5a7d59048f49ada3571849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567549c79be9fbab9c78292613738986b
SHA10ccd3775863aeec28810de70f6b78a8e50effc82
SHA2564bde8c93948d8a8cb214bb7feb8ef21570868461264c3f60c4ae382ab68604e1
SHA5123d35faa663d1499016d9f9f1a3dde29211a2eb9e1373609f21d1c06d5745c3342f7cd1363d57afd0927d9ef2df95b17c8407290d7cec6a83a17f9f16cc436778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5830fc8dec0d1acd51c94275896c16f3d
SHA1ec6a97d7b8892055a74a0bedb2c8f95761dade31
SHA256375c33b68f23f0316400a429b4715398d99b5719808c9f2fd73e53ccdbe104e7
SHA5124f64ad5aa72f8b3ffbd116172beb8591b737e3ddc0df92aae18c5352850f4dd0d35b9a84a1a64ad61009533b65289581141340113542725ad2cbd8ba9e28148d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6450f2203eff66e31aed45f62ded73
SHA1d858911d77eb088a13aa8de0db8a20c7f7739a63
SHA256f09ba121cd8253098dc1d3771b48c08d84bb1db7b089ee7472f8763afc85d137
SHA5121cfe3ecb419d7d7f702db71736523237eff9429ee2281685e2b4d61aaf03c98e2d7e2c69b0574f88c26dd21fcf1425c9706096d37ccbb54819fe58767e2c1d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf9ec287411a6d21b7a35271ad7dede
SHA1f1d098ecc42707c0cad50b301193e2db798262e8
SHA2564e64a2cd1d75c32e3696b8913c8f5139ee875eda964805a5f13bc387200d9a90
SHA5127ebf91b1ab35206ea9146ed958039e94187f2711aad504f9231ae17c4f951aeab6c2be484fa3647590a2f7581d60e10c829ae6ee74a9335429b8631506088b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a200767292eb73abff30548cddd7dd8f
SHA16f36df434c67708be8256fcd0a834f3ebd2278ff
SHA25671410a4856eb370ef680af3366a38a6b9b667f72636f3d0c6176fb5e8ad8d576
SHA51252f76dd773d0ae3b862d8300fd69793eea3015d2ca7780222ae6e9b71aa35d37465cae1a11cdee21e209d1e115ab54fc94bcb93a25e2d513c06abfa08e70dc92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54269627d0442f9aea6efcbe681435dea
SHA185f99afd923ef3588625efb9d439d5cd346d997f
SHA256d3e8c137a61981a6b7a128c7d0d45842567485844185ee78199e3df2d1582d91
SHA51218e976798b11cc55420add68d9e9a71b3ce3bd35d0cb680dd5d360614d6464d8ab6197f425e16cb95d2ccc69bded44605e83a43f521d242c88231c43451b86e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f6558a3c662e889657dfdac56cefbfa
SHA12ae1ab7a91d39fa4731f58e7f3a4cd9e014f5418
SHA256299fc1d02e4dba42edaa9b3a2228bf55a745adbaf75867512c36e93b76912c43
SHA51269b1d769dded05d569df757a31f955495d6667f6aafc7fb31e57be0734f7ce3823c2a09eb437ccd131bb4533c5faeb347c4db204e68942297f717875e13d6c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c64e47afd21345f4b05cb475d74190f
SHA11973e7bcb47968ba8ee8e871e4a4befede7e7e31
SHA2563ecefb7a0e330f56c8ec95660c931e12f917d5583a0db63c0980feb53f9f281d
SHA51298c8e53ae9fa6220af36cfc4ded00226b93201f556cb9e4d2c9eab7bcf7ad53fc60d9ae7578d9bf647154abce6794655a6e62c209d189f1f59ae45d8afd362d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9b57a8c27d7e108dc1f2d49cb04ba7
SHA126a96156eab9526a492db88ff6d188d2edd260df
SHA25623bb4da5e1d22782b42d756ffed8e2b75aba0505c601d99b8cea612fdde6069e
SHA5123e63371bcbe83d3ee66deac7de52761bc1de8939496c65baf12e35ce235b904fc7a0a7ff92fbef7cc9328b5134b6caf1ae85a10f1160896973c211d69e670cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534001fa49b5e1decad73bbbb0d2ba8c6
SHA1ccbc1c7e2b91efeb987d2bae69924ebe6c858189
SHA2565aa214c03d357f874abcef60d05164b0d64894872b0cf1f509bdd13374db87e1
SHA512a09b88e89071a6e3d972fd4cf3558d1e4c492a71293e9082fa7434f573e2b9e150fdc17f73cdbd954e03ddd385fb25678ee5a8ca5254d3cb705da47ea0ab0ed5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b