Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
eabeca12608cb37808acad5daaaf5fe2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabeca12608cb37808acad5daaaf5fe2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabeca12608cb37808acad5daaaf5fe2_JaffaCakes118.html
-
Size
64KB
-
MD5
eabeca12608cb37808acad5daaaf5fe2
-
SHA1
781163f3408fc54ecea4bb867d69966514760a64
-
SHA256
0310b7c9d404fa4c8d54471f034c8dae204ab9cd2fb1f4042e870ae530733bf3
-
SHA512
9f4d9fd0e871f863252e00d2f411187cf29b5633ac7b20f8f5ea40d5fa9194799e8cf49c645c95d471620e55f1f2c16774f9618d386135fd6ec2eaae92dd7441
-
SSDEEP
768:SiHMDjOHcTOfpOnHUOcb20OO/OV3OprAOvUNFUO1b9jO5kim5hROexOO/1GROLdB:SiKMLqCP9vaTr1j70lgEn+p
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4E4FC71-764E-11EF-8778-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000e49918284039b31ac9d5293949883a10a8fe9b2fa1994ff562c9e9dad4bbaa53000000000e80000000020000200000008af031c7f3cfab122e7e2ebbf2d5817a2302845e9828b68f7a1f83387f248a28200000000cb7bc4fc1dd6c5a095ad62ac82907697853eefbc4e340f02b34d8e64e07d92a400000001c69f42176b8de485db3d114a14c1a16b226a7adeb79f3e4c5e65d4f4006c584bf225e9490ca31d6604301013b3b3c5bf3d4a714da1df6b217356fc6b3c52d02 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f5e8a95b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1448 iexplore.exe 1448 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2812 1448 iexplore.exe 30 PID 1448 wrote to memory of 2812 1448 iexplore.exe 30 PID 1448 wrote to memory of 2812 1448 iexplore.exe 30 PID 1448 wrote to memory of 2812 1448 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabeca12608cb37808acad5daaaf5fe2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1448 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58926c19e475cc8b6eb1a23f9e43fd2b3
SHA104f0307b7a2cbffc6872ac5b1dca4ff041174bb8
SHA256b7071a780e82029c07f74271f4c092176f6f69819740c6e8cfcf9e2e6a93f98f
SHA512ae23d8114b1e23065ccdc5c6240867b89007da18f1f4fa1f344e5a1cd94dc0437d3cdc9b2d829f43e0b8966f6c0b3e718d076c46eac8c76474af7f1564641a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044a46907d18d4c2f1923be58b004834
SHA1a820ea04cc7b84bb1304e1fbab7ac7688f3a89eb
SHA256050b969a05229c09024180d5af96923d6206d70c93be2f89d61faa1dc8e81a12
SHA512c7e139e0386d3b54037cae23e1a0caf386293038ea4432d0aed9a7d8b83f8764c2fcce295017d9b9ce4e4dd2b526a17e0f467669172e8c5340433b16cd349e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfacbda96352a32f8cd3884074fb1777
SHA1d8ef5c5c90a011e5a67d62dee2bb9d00eb353e08
SHA25613d04a4a2010d237f0f256d6360f4d15ba2b4b50aa22bf81579dbb327749b977
SHA5125725878f21fa8424ed2a5bd87372f70ff88b8f45afe29891323f8a8f60c1402ff5619a9ffaa76c6738b88c2fbf2ace0a2e695f5422946f484a7ba034f659a6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520be9bbb333e67da0d51e26d66c64ba6
SHA1a354e9e3bdbc5264193d54935f6545899beffb37
SHA25647af48c127a2890d7a1957d9767448c069538742d0d25e60739526230e63c78d
SHA5123cbc94a2fd1d3a444ce5aa9f63c981282491641edc91f4150a7d9fae8abef37e198e0301431d6198619df266de2a19ddd1ff6bc06d42169ec885b74944bd9230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8bff95ddda1205d7da3b6b399aa6fd2
SHA135d0219defdf81267482eb60dc4c60d9f9b42f6e
SHA256d157f34be4179de9c6637dd2184494ed9a3b132687b5651607061ba014e89abd
SHA512f78dc5699c7fd78b13a8da8b4e7e76fc293086ebc270b3ec99abca19b8a59b73539ef149c3b40501d3487e98dfda221ab8129f64d2082a6c4df4f260832f52a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538674d5041678e211473782d2b607ef6
SHA1d76bae5704c1ca7556cf83f3c2e490c514a9e3c5
SHA256c4a38a27f55d659919b83dbcad5f428cd4f2110a2d6f2ed90c874e72e1099034
SHA5127476417a47a13f2e37a4d791b74342844493185bc782f4fd0830dc1cd906f4ea7feea1153a377f9ea0e0f33b9e5d7f904b2d6f695ef5341ebafb8c27cabd34ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57edb9efc05802a73f8c347d6e57277cd
SHA1ab631bb958ea023365d18f0df07a4247952b9f31
SHA256ea0b3555e3857acb8c761f74192383a819311b36079875707d18651a37077bf7
SHA512a6b9227c7b0f0a3d1adf0dbb781f1b4bb1a9ea3e59534250ca927919d1b2a9c2b0d8dacf61b799515e974250ed64bfbb487aa1716dde30b2567c7f3f5970843c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aecb7b67cbde05f58f04da9f7fbbdfd
SHA1050544fa1fe1c29676b3823ae5550dfd4898bcea
SHA256b8f7bf8085e08a3c7848e7f503292a4d0e65e29a3231c3b3b351e226d756df1c
SHA512147b7ecf4601a8a9c2507e5ee626b273fac04ac6d6a63e981c7f185e329de523551cc49fd5768229b2dd764894f5c60856d315126386b948ed0bd839cad1bce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d0557599119b68512527aeb084845a
SHA163adb05a54db953d196417760d43c4c5946ea017
SHA256405f7eea306c4ffb1d3eaed17c99d6131cf6948e61ee2759f9953b9a928b1357
SHA512f30a74d6302e01b10c57986568781ad32bfc1c5b8b685ddd65d1d82981eea2c2b42622ddd59a0e28251a585fb47961fd0dce7e77a73ff98bc9052599df55b4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268cae829ae9472d209db2dba96fe29f
SHA12c2f7d54748a8a4f222b0ddbec5aa136f52760e9
SHA2560dcd9d8cbefbe8cf9dfeeae017ffc0292fbf9402a54c39eb611db8bccb834752
SHA512fa36e58bd432bdd07d0bbcdf8c2dd97104d0ba9d8907c09ca1d2dd7127d71c1c1a653696c871bfa940238a53fe975080b14208bdb972878c03cf1cfa0a659200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1c637927544ba1feed18106ed4901c
SHA13275d33393d19f8663bf4664cb64d15bae8f4a7a
SHA256f48aaed19b392dbc5965f5da2ca52df023fd20462346c7d64c14024c6e5cf631
SHA51289029a682ab865e28f51f2a13dfefcf1136e7169d6a2c3966c6685420b5eac66679f9035ac5d4baeef843cb0a370b8f48b3142f241fd469792692c2b36b30f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531cd310f8e354ef8e0d9b83d6e09cdf0
SHA1a018c6b71fb5bafe8d56992436cfd4e732a657a9
SHA2564895eca7ab8878b3003476e91fbadec7eefa308b4c65535cdf0adda147cf6dff
SHA5120ee1ccdcbd6825a324874bd070ffebd642adcd5181db9f4f14f465d1feea3b21a695198a8678bd3082d2b8734a7d076b5e0ba8d0033860a1547452f1ff553e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a847443f97c5b26e93e014960e3e89
SHA194b797e08ed1e98a5ce643f6a7da9fc7f3653012
SHA256af5f17da56361bef5bbf694090a7084f0a9d716d78b7f427eb1128089e0d487a
SHA512b37721fdb37a8bc18c51ae297a5469900af6cd927a017a42d660b28c01c937a39167032d375d2739ec2e0ea7b06d6bad7c364c7bffad9829af7cd9c98eebd736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c367de80136eafda4554d784299254c
SHA1118cf8e1657db94f2aacd6d3431ae4e7e558fbaa
SHA2568a6b6fdc0ff749d19b101e448627ff122cb644fe919af2dcf7088fb387dbcc4d
SHA5126006ada29394ea68100a452019dd8beaf774d128177d67cb87a52b9e89b59c6cab217b743c5400083f2e00d3f6d2b89eef07dde96dfcaf7bcdd96ac389cd76ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b89b2e714a2684d9d12f908ad854bc92
SHA10ad7d1c24bf08ee5265872f4db4aba50a9bcffc2
SHA256eaf0474bf4b49cc8ca2f575c9e180f4f75aa5f4d9addcb893baccc21cdbcf566
SHA5123cba3b6141becf7a7dfe4fcd948330119727955900679294c7923cabe4cf0016427542721fb76cac290487f70eca838bbd81ace55afde2e388aabf4830ea23ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50753c4bc623a880af2efc746cd7d0f
SHA114b912af446c060540096911eff1acd9de8f2b0b
SHA256aea5c73f201ff19ed760a8d81d18ffbfba8696792062224df969e73333a237d4
SHA51276ac500d2678bea24c6e2b22a430449fe735b3e87b15a7a9d2406cecd8b7ca1e7dee56d4f05d644677bc15962b57eade1570a54b7d75fd875f9f123076d6336f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df67f627170e134f9936714d2b45325c
SHA1b632c6725a62b2decba667cf6764a6dd2fecec39
SHA2567bf0fa023653673af718e0019a6279c90817e8a2268f7345842a550092a5d819
SHA5128206b0e97adf0dec7d77024f550fa0079f01d77440b07b4e05804852d078335febb3b4f70508298817c64559bf0ea13950c64a18a0bc3b2a884b5710efb6fecd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b