Analysis
-
max time kernel
137s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
eaa77363393768935750733dcbfa717b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa77363393768935750733dcbfa717b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa77363393768935750733dcbfa717b_JaffaCakes118.html
-
Size
243KB
-
MD5
eaa77363393768935750733dcbfa717b
-
SHA1
99b53590aa7c52df92b668e8d7cd5c9b1142629c
-
SHA256
a264de4a3afdca8cb04f01676e92795c0ca92040204db8542d0c20783898bdf3
-
SHA512
aee18be2d194a1bd707a1b12e790f769d62dde80ad9ee10c5c6127919798716e536aa8e7ba4c8010a696ba92bf041ac134bde76e09857cfe4810a696dd237787
-
SSDEEP
3072:yoCRZax0XdjsRlm7uS35etZlkCd1qohdTzYYdW18zVAw/n8:yVRZaaKSwkAhdTzhjS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000c91ba4f28fe028da0e0c79ef38a8cc29209eaa4e355110dc51a222c88643221d000000000e8000000002000020000000298eae476a54d7e9b731b3407fd4827a684553332294f551cee0d09cd2a0cced20000000c650d4d91557112a32d3dbeb3f2488c61dbc3e78b6c9f782f057ec6d3073d1df400000004d49337711ff5ad28a4644124f99a9f1678645d436beca2cc239860de8b1060858b540b33300ab05376d5897b5ca98e4c8dbc8973c3dee01ca94ac2e313e344b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884875" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0427237530adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E185D11-7646-11EF-AA6F-523A95B0E536} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2856 1960 iexplore.exe 31 PID 1960 wrote to memory of 2856 1960 iexplore.exe 31 PID 1960 wrote to memory of 2856 1960 iexplore.exe 31 PID 1960 wrote to memory of 2856 1960 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa77363393768935750733dcbfa717b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdcc40e63587f5ed126bf99d9a439f62
SHA1ec4748afade07f7f36896e8ba422c1c24c799a26
SHA2561ecc5edc849905f513f270fe7517152d354f81a9a9551b1b80033f876be62b1b
SHA5123b97b17bcf3c9a47f42176a9444b964e56aafa11d84b476ff5161b2f7711f687343f9b955501905a59b8e8673c283c199b7c4e081879ba85adc19051f69478ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d4318b871cbff6cd281c8e5f8dd81ba
SHA1a1bdbff8aa9fea0d0dc2ba98745083b75e187f68
SHA256eb5e16c93f85c9a0e43228ebaa5ffaae139970b23a702ae2c63205459d2aaf84
SHA5122e313a75f3e83a328b3482b2cc2c3eaf305dccb66d2718187b031bed8eb64dca9477a1795e9d1248f2a5990fcae0b440e1281b7f2f50f8853aba74821853cf8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51089aed2cee2ec1c3e537aea95b137db
SHA19de9d653b1896ae5f6afaf6697f45fd76002871a
SHA256d2a02129c376e461301db9aa736734a543957b911b19fc0bbced70b4b242014f
SHA512f496acfda1d6a7fe686a0a6dd3f12f8fc722b1aca2ccf8b2019e7cee17d1b640465044df209b5a6c655ce14ecd348ff77d8db0d787df5d370f6366b3d9da2a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64cea2996ab0afdf8d9f05b2433b5bc
SHA1a04e1c40f8bb5b131c3a76dd68b6e7e5988d4b6f
SHA256503fb1dc3db23cf47790735fcd9b28c58f2c19bd42784e39095634cf9e585e96
SHA5127d3f3cc5f3e3103f519bc0bc3575620d4ac18a7091cd429734d146da7858d3ba33153ee8bb6382620b0007e5b279da508a93504e10bead84f76f59242141abd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e0989e26fb3f9740262a9f8cfb0e890
SHA1f5888aacf838450dcf885907a642a90021bf546a
SHA2564cd82fa47cd36a1ac43fd50bb28195c9c816ca9655e148fc6fa0151b90bf4154
SHA51281af8c0ae236ad59dc4b4cfbf07a2225eb5ea6f4a9b9e9ac204cd04944d4e166168343ab9f32379f5370e71c719ae068ae620bc9f4566671b3bce4b8c87b3a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3acd5b0c93f533181ec1831613455c4
SHA13a885731780ee936a574bcb817824eb893fcea06
SHA2561adfe3bf22bbe75af9b4c25d52b454e885d940c9511615a71dc5916eaf9a994a
SHA5129a2ca3d6e95788fb981f02cf447b85bff7d03d35a14c4ee9f1070974bf5030961c0bc274320da74e00e446aa09a3a1c3827cfa591495ff6b629007a1949ca309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f04c6df3662e03137ed154b67d02c7db
SHA1365d7ad493ffdcce31ad5af8c651b6cc844218b8
SHA2566cf5cf2f3df68626ecab12d06c73c40e46d1f847331205c75aed4cf9ef59bbff
SHA5129ca32c90e4a2ff4b94ead0772950f17edf843e281798a509bb4415d18e69ddf7c82a6f3437c2be04717ff98cc0bef951d7f7b73cf400a69865b5355b0d1afbd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774cb1b7415df1c889823227029bd2b8
SHA123d81264057ee8ce6dadd65345e61f4aceb11510
SHA25647abd45292f57f4bf5f952693d4f381a0fcc7a3ffc379afbdcc3fffb12bdb5d6
SHA512c7f3da400d19aded957601dfb4a26777fbf1f51b12dfbee68cafec4b0474ae23c5e295a47ddc5a6b9f12aa2e00214b3c722fa02964d59b8f88b93320a2f0f1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa99a6164073d8a8ed7a445b9a6d3790
SHA137ddf8142210a93757e348c3760b1f02f2f28234
SHA256d3871a7e39033e4632438bd25740c7543948ead7c36922775b393db489f1960c
SHA512b65cde7451056b303b0f0d4633dfd631ec406d747db3513177349827d9b6fa7b58e8028fe9af112d048451412891298f0192f75aee07510ed63608a1f431e06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b15f4e4f52a1a91e7b9903e45f26ecb
SHA127c38be5e440e3302699adc3acdb41fd5ea4de85
SHA2567a8c073541a2a7d7c80a2102fc8ccbf5089784e65dabd1c0711f83c20f614788
SHA51251eb9b85c268b1b070099b8dd34dad2de7d3b5e6716f35acdbef9a6a8e298a88193bde3f2de94a7015646d7c1c71f206c9b4bf179944935894f2d0fac86aa470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9593f43f368b6701a03c2e694fc09fd
SHA15517a320c1962181dc70a6df00eede12e8957550
SHA25609f0e717bcc7a1480270227954304d55c3eb4dde3e3daccfa97621b5a3d566f0
SHA512eb3a7eb1b600e533914255ffbeece5bec991655130638db46eed6ba71ee342020ce658553b03d2925e780b073ea8e38b13e64e963835940ebe0380a71b323a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c1f00796b1c955cd34e611786c8c6c
SHA1830a65133c21af99f01febae882ccc7881b4adc4
SHA2563a1928c34cebd4ba20d187ec13aec7f7d0470f4d2ccd922a10abc9bae4eb1009
SHA5126c0e5639e28cd6717eed08206978660a4308bc37ff2830ba7a18bd571972456b869d2ed144d641809070e1b014cfb8b05459ea687ec2b4b51a016fd543fc6ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9536993a51d5b652ce422d98b2e17b
SHA10eb834c53ddac32a4dadde92b1cc7bc545454172
SHA256ec04088ac9956650cc76c6e766215b80693aa135fb8666d8bef60da545ed262b
SHA5123d04042f5edd2e1724d6ee629af5e7dca8aaf04b893c5e4ad5d9ba64a3e1698ab3163cec96686d7dc601a2b0e55d5c41250df1a9b3391c774014698df21712b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578c2904e206f67d392d3943cd66ae191
SHA14d58cdcf0c519f0ef77500e3b5d4d34982d8000b
SHA256fe6c7f625a16639534ee66084256b3bb61da7a031fd4e567f2dbad5dd5eb19d3
SHA512fee54a3d5520269466151e8ac045fac4537172cf90079db8ad80ecaba3e27b927a08c1683977670d5119019de4aff69afefb0ffc5406f12e138aca8ed7a6c0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba4f9ebc43126fe8897cd4b6c1ceb8cf
SHA1f69f4d1552f615901acf8d6b7af1a845e8892710
SHA256544c6c835eb30d7e797d1ae10c8bb7616a78ff3ef59c44c7aa75d36544012a2a
SHA5122fa575d56460c623f74220e984b49c0dd7177f87488897d793c7327133f07c38cbae96793735e5af712295ce8c309dee511c12396db7f39e743d708672881316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7b08011c48d3e7966fd680eba9ca2b
SHA18d208a6a9ec3f1be3b049d2aed92cba1929fb324
SHA2563d3f14977fca028b0e7df2f3a4530456490047877c8b1564f4862b4fdf0317ca
SHA51237c563f38ffd7d3d0376cbd3337c2ceb0625f51e297d9e7b2198e873ec46e65634dc4eb522e84feddecc0f69ba0bf871fca4f2a3f386d77a0c6514ca089917ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1cada20f1bcfa4a0e1989494ec8f76
SHA1c622cef39cc84c950f1fdcb3eb628304e9b9b0d0
SHA256f914c4e248f7ae001ea664694ddeb435aff6009ba782ff37db4824980075dedb
SHA5125494774730a0cb0f9f8639db420a01910a71917425a9ece6047a0c255e5b826a81ff1fe4463a581bd9fcfca225952312c80c8ec3827c01e8de835b9d296818f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc737f1af57dd38ffa37c4fa9dd017d5
SHA1e09f7fbe8f0f9c31e08db05c323d13096a7634e9
SHA2560a9219eb16e099735c5fb4c167c8936cda0540698c90f6c35af251814e7bddb2
SHA512eec98a51983cecd062330529b744cc38efa66d58b9afc63296d1947ab03ca29d2d613f2f134f7a6b17c492bc38c536f8fc77ba1ef181fe3351d9044e44061cad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b