Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
eaa810780059c24d0e0d9c0daefac143_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa810780059c24d0e0d9c0daefac143_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa810780059c24d0e0d9c0daefac143_JaffaCakes118.html
-
Size
461KB
-
MD5
eaa810780059c24d0e0d9c0daefac143
-
SHA1
86f55fbf5d3567e8d62febcbdab2ca6934293614
-
SHA256
780239fd45bc8a5f5ee2b163546910a111a85a4098bd28a1e037cb90c097a9c9
-
SHA512
575aa75c85dca107f29739d0c8ebc16f2cf949bb7ffe3352a7a53a03c35fcf38b02c14c2f5d0d73428cf26817fb5c7648338249f376d9d37b899c71d225738a1
-
SSDEEP
6144:S7sMYod+X3oI+YVsMYod+X3oI+YzsMYod+X3oI+YLsMYod+X3oI+YQ:+5d+X3v5d+X3V5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FB830C1-7646-11EF-B525-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000e476e3653bff1363306e9e6dcd0c2ecad04b3d8c4c225df1713e228916270ace000000000e8000000002000020000000a5f5205a82c97dc6ea554f166b840740949fbdc1c70969193a9839414c0706ec200000006ac00855eec50bd2de751e05b710f5655f5e0a93ec000aeb6cfc7836020f24c7400000006cd08ca0f54acc119a15cb71a6c0788ceb0f6c637139f72b52a261cade5a932532d801567dfa183341aa496bd0364cc39414db9edc14cbcd10d9cc76f3e15114 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b068c569530adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884957" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 536 2552 iexplore.exe 30 PID 2552 wrote to memory of 536 2552 iexplore.exe 30 PID 2552 wrote to memory of 536 2552 iexplore.exe 30 PID 2552 wrote to memory of 536 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa810780059c24d0e0d9c0daefac143_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f9a837f4f9d158f320acf0b35f2c8bf
SHA155deba3988546cb31a472ccc5d91861774e18494
SHA2565a9d669151582ad255576fa17b7ab291a5ac43ea72c5665d98497ab64ecc58a6
SHA5125b0392fcf54f08e389ddb50e295101b5f90024ab23a39ecbce44c1a13ec0d235ef5fa69e3ec5aa50f2cd859c60eafe37c586859237f25399b17d3a73fe9c5113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e48d235ed7417e364e426443ea30660
SHA14fc896aeb12e37f2505c257569b47c945b0c54fd
SHA256040ad692fc8a73ef519cdaf48c7713a885c6e7b089cd226ae529cf22e4813322
SHA512be7abaf1ead17f9ebeebe0a0758ee0423ea932446ff68f217d46c614103dac328f5a5de2d1a28d2dc4c85f63bbe6f7ffa21d3a9fe2cdb2c2f67284a09a7deb5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b3b28af2d5c6f8ca83efe433fbadf64
SHA1a39fa6222753b1bdbe8ce6f2265111fd9f2c3d31
SHA2566c3b4e3645a8d833b7257dd2e24b446378e6e11878a60b74e393975dad88bc2e
SHA512ca14ed43f0e9bf19590d7ad461ec7df4cefe4a207dee7e6a80da1ca817d250b231f62f3c57dc336cd7979c325aaf3043390aced2e0946a1eea7c41a9ea1e5668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56307b80f20ca804db6cbffd89ae3bd65
SHA1d6509389d77859dc510e47773de20fb8959eb3b2
SHA2566fd2d5c5cb29c23122cc69498b93555d43e46f94904f2af653b57e4ec5dcd5f6
SHA51250ff7c96a9321b99e452c446644d6997622b626d4f6081f557678fee72e2d2517e9d306d73a4b694b86960c6b3f008f8620f0da85b538116c5a66270674a41d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51245ca8b176dae27bfef86c9b5060c
SHA175c4eeb48af7af6b9e5e083bd55df3d267197c60
SHA2566e14af6aa757edcef417f30e9200bce2bfad545cbd893cd5748578014f34ed99
SHA512bf1d44ab805145bf6367d6a76a869e35eeaa9ed37a0ae350c1749fbbf63492f239b5d53d28c14298b597387eb59ec10bf995c5965c6d4e692792733bc90da6c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538aecfdc547067e83b0cb8378ef24869
SHA17581dd43f9b907640fd7a2b86a2824d15e485b94
SHA256e6a62dcb340f3d2a6e2ed0c0307a65e4c218dd6a147d8dffd803a080f97df6e1
SHA5126320cb0488fbf092c014227f97abcecf45f3e1ef06305a37874b04435ea2d7ef1077e3e146b15217c286754cb9d6888d24f67b382874642943f658ef596d5ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59065e56078f61a49e8ce05cc4b326814
SHA17ad012471e7d825eceeb4ae2391ac443868717c8
SHA25614833174df8be3bc6fdac6a915831a32ac780562213e380ca319085780bc7978
SHA51214985c8aacba1ce087794ae9db3c526732e22092aea6010517cb3620c1e63cdef74ff5248c6930a3f54218b5e33b4f0753dc875096bf30a2ccacc3cf1096329e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f776e594d0b1a5114b8039ec6896308
SHA17f96f1847550cab648d39ffb05d94e067abbff6a
SHA256a3007c2a7002e790a9f4522f31ba9212cf083a4d4b0eb11ce366bc2df7410d6b
SHA5120e04df82de5472614974bdbc923f2c04cd172aaccab736501ae0c17102100ac7bf99beaa247a7a2bbeee9d61af2f3b46895b617dd7d495347ba0fc055e0b2b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c45d3b9a9a816ec3c254b1fd632cb0eb
SHA1991dbf2b1a5de68649928a624833553bccc4afd0
SHA2569a892372ebeae763ad72fe14d8df8a924bf2756fb930be5a53207ae793dbc927
SHA512f0e98bcc1ec8f92039acdc7e7bb846f9b5fe7955f0f3d5d2a0820f5b038f567748cc0b52fc2502d9bd252a23669e9735b98ed34b1abe6e47bc813c7cb7ce565c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dade13f92872c1214eaf5892576f319c
SHA1462ffa00524b902a5e744a9f95b07e812590ae7e
SHA256a92717c7cacca253508fc37d6c18d2d67d7ac04a87dd78ebaa139103d3e58c1b
SHA51210dab9a56f700ce02ba915f3407c563beb2f84c55e3aa44f102407c9ecf2bc38b3896ca9395c68aa1ce8e4f72f68b5a8c7776fc0b523949b7755d254efe0abc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417b718b3bd5ec57578dcdb4f0a7be0b
SHA1d6d357cda6db6ea1ff7be1327d822fdbb580476e
SHA2564cee19a4f8c20bf2b40f2a325ecd11ff45cb23bf54551e5115f89f4cf03e3342
SHA512e901f41df6d3a3604c0c0715da0e98327e5505e24fe8c35b284ec8a6e95880d36775b59934a69e2997c83c92e519418d6ceda248a03196094afa5669d77c8499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503cf49069a9a81ff3484a2af3e9ce679
SHA199ebad0a6ec2dc07b047c313463601651d8dfd76
SHA2567fff40012a4a7f8f6a11840394cb186748ccc76e1d7ed208343c251645b2bd85
SHA512863951f9f73fcd92451edad1bd896c6b6da466f68195acbd0ee2c74d1df427cf687a10e5c3efbec3e0b42164b4452d9d22fbeeb4fc10f3a4a1eadca61cfac33d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8a3787f661ea7268e91003cc77f481
SHA11a887626b1e4b8d9216cf8bbc18b00d5dc2e06fb
SHA2561ef52989184c38b5420e98bb3362c3676d1c87b4b19cfe0ab5acca29215d495b
SHA5129e4eb83f770daeaa07288720ef8a750c0989e6d0d8e5fb8c26751268f1ab878bc67c0e3900d39f63d9768feea29e0933b82e7216f5c2ba96cdc5f57c4ca1712f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3209f4cdcc912bdffe148e3cf729d26
SHA1967f84b3a6c93bf042609a7738024c14ce3b5d90
SHA25601c6ecc1a674f7c2b731ca27f187cc3a2e5c00d618159376063e19267a75a1e6
SHA512b2a9f8f318d64e96e1531595809c9653b49814d45ace8a8caaa46525b77ec7b0e6580176eb5ccaa595c279d3a183dc25626511bb6b6c179a06c983d8329060bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d1a66ab05df10599b5133aad18aab76
SHA1b82b0e88b80d1aa33f61d22f0763dad8453d015f
SHA256f9a32c68e6d4b1e3386cc43f88f63d143f21d5ca63b2d719df79e7e0f6c5363e
SHA5128ba7e0abd6ea476fe7a9395e5d9776b6110d1c7f7a3bbce08f1df19e3a207937ff71e95161ee98fa05c9f0a8dc6392ad189a42c3a1161fc0412314e7c6f329a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4adaac7fd49a7d5dd6b7564b40799f4
SHA12d98cd7e1e68d3ea12d5ec0831b8fa7af1695874
SHA256ec5994e461c598e4e3b0a658f3a214dc582372ae6f0c2327bd4ae45306ecd0d9
SHA512094f314e0f1eba035ca33f2b8b84fa2b25eecbd328a9b86c34bb7a41a436cf4acc8b7f02ce00db67c0fab14f046eaa8a163ca1acb3a2a7079d54d53d67eddbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ca4b60da65e9d3a379a7d2535f2a96
SHA14ccac13c08133552126bb7fb3bf8be008b15ddab
SHA25662ad8caa37a185298460c00d46bd2eb169d368e52c2bae7ceff35a4e342d89f3
SHA512dc1c19f3c458f974ad5d11de9ba2b97fed32e8b0349a055532c883f059492c1ec6c6f8b49003fbea98173e2f20c3b60f40516772925cbeee056644a680ca9759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f5a50dde32dd58a9ac0c38bab8340e
SHA12a3b57e9362cef660b6bbfd9f936c9de99ea80fd
SHA256a604ea29f5f3fc1ebee6cc1995f44fb04d393ce335afa3a68eacef4274dd05a6
SHA51226c99b05d648b15e7f654dd459807eddd867473c4369ca8244e735f9a1e57a374e4e3724ee7eca2705477a3457ef8cabee195a9f3fe60fdc499d24a71de1902a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a195d7248c6920897ba2376588cab3e
SHA19efd8da2a70ea4a6a8a07d7ed654271c544c4343
SHA2568ca94dced43014b27008ac3b4323690618537d068177ed0fd3a1ac11221113d3
SHA51207443e3d5b47bf060f2675cb39a2c85a0c9ab13436982ee66eb8b59f7213dd15d5d2be52e5fda8b6fe23e6db1ac0aebbffb9656cc19907e162c6c426d71708fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b