Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
eabe62792866c1923e3e45771d9188e1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eabe62792866c1923e3e45771d9188e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabe62792866c1923e3e45771d9188e1_JaffaCakes118.html
-
Size
5KB
-
MD5
eabe62792866c1923e3e45771d9188e1
-
SHA1
a6ccb390d4622b352de1c28856083d36712131e8
-
SHA256
9f04c5cd8755d2a43feb816b48af79e0ea46063e29828597ca99cb921576c169
-
SHA512
6b808c9629b5da42c08678e554760b6bb9bd58d6b0af64d18130f9d7b3ba106ee4d1f8d6a5abc794b9d2c7292142ca9bf32cfa5dcbd5fe5da08cbe09bc2b579e
-
SSDEEP
96:81+Y3WyDndnIKUcD/w4sdfBP1KQiF0+2aGrffq3fq8fqGfF5OTEPKq7+DBe5XSDS:JY3dwvKBFPQ6NDF5ByBUSPW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000004f093f9adf52204f852a396421dd81bc0acd77a4b98c7c264168f79e60381460000000000e80000000020000200000002be5625afff2b26b8a0541a4b1b6a4503a49778a647a2f98372920055b1b7d5520000000ee2407f24c363939a88ed964ed56f3b711e6dd669fdd8aa1a40d2210af69f2274000000094787d153ff6bd8765a22d749288fb785877bad5c2f61612d32b2510e847fb832aff0f300956c8bf3b0a541ddd085c373374dde244502743d2f27c98025ac171 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABCF7FE1-764E-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888441" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f95c805b0adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2296 2700 iexplore.exe 30 PID 2700 wrote to memory of 2296 2700 iexplore.exe 30 PID 2700 wrote to memory of 2296 2700 iexplore.exe 30 PID 2700 wrote to memory of 2296 2700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabe62792866c1923e3e45771d9188e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0ab1769d339b4f4dea0f222aea3fbf
SHA1340050b129e1afb6d46b50099f6420fd929a6fa7
SHA2568f8b06b750e305890f1f8058b40d0cd48eb69e0430599880a0bee88a015a7e05
SHA5125e8b4453dadb8a765e352a9fbf92e0b0c6243d2049e24a6622ef0066701f405d6aadb820447f81f2f83f0f81e8ae28a19fcfbc6c6441f61e039dd1713bc9fb00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564165087f29f54758663e56911597505
SHA1655d6af8845d23b94edfb843b9a3190e68e9ab0a
SHA256868c1b82e6b392586378aab481c2e542ab5cd2483bbb1116871b43cb961aedd3
SHA512fb2fc6471f6bd99e8e8f284a479aa755b92a629e1a75526e4c4aeb8d1c4fd7eb6adbacbd40b5cb6cf19763cf7299d4b896d1c498f4596bb544ffd4087ee8a66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ed34aa54ecb94e04cca36572b4dd62
SHA149633aab2115c3c945efd8252049eae82effc623
SHA2565c0a8b248eabdf00eada83ff0b8a62a62306dc1916c48992306e6c474cf169bf
SHA512a74b90e06247f956c600403fdda95f95ea3c389df00539366efe292dd8ed98bee97675cd2124b560a38fe352e70bc7c74cf91da6cedd53de180db483695db7ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a2e16507e5ee95701c681dde5cbf9b
SHA1090674f627eb471ca2f7389a63ec8ca41e38db42
SHA2567e9f6ca15be55d6c42c3235090dc4605d4a945628f4ed8630d77f77d2eb5f99e
SHA512768c1dfd0facd470059f6918b3145b3360ad45a66bf8cfcf13bb80451ff08ea6e6e10b391df027c9ea01cbd6cfed571e9724eb9248cafa97bcce601f99c6e8e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ddd6cd4420efdf1b090bb7ef515668d
SHA1c2f40cae15b9bfa5b7c4b20d92caf8fbd2edf413
SHA256c368c62e1f7c55f43c0e9f1c4e46eacbcb4e55a26c9c7da1b04afca9a4db0d0d
SHA512b38240febf1e8eccc77e69c3da0f9b74d412ac044a0b730d278adf32efffb0f5a631cfc09d46f9596e6d2c13b7d432f04895ead27ee79cf4c4b59ba25f09942d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b91024068a4d705c6fed48fe45813e
SHA1110003e20f0e08d0febf4acfb2496b9989a6bf50
SHA2561522d2d88d7cad5b19b9a62d3b4c20fed6f8018638dc9a5d947b423f54fc3ac7
SHA512239270834fb90d61e1b084dc64c12ced0abbde7d4e489a949f320bf9362e2fb07179634aa883f17db6d460704f773ac2726d0335888ee071f5b9fe6884d5be54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c739ce59118bc309e33d12334608c2
SHA140583ce55ffdae640455e0c25e635abe6b61eae3
SHA25669134793b316a6c88a3c67e566fdd896213f673c349f196e8b3a029f059038de
SHA5120a786834a0688259154afc4e6db5d124b571c8769daa830c2702db6691bc887ca1b2632e6f138b5f411c01d17e12058db7aeb06861385510e76a7a025016e40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b552783f8839bdd22bb6c3a9a643f4c7
SHA1d279d9d38ae0ee5214511998701db2fd412ac2ce
SHA2562673a2e5d7e9271f10bbcfac7d9ce2de5f1c3b1569de586cc669f4b6cb1ab866
SHA512992ae295df490782227f89661a04b63d0ea52f62cad541c9ad3435c36a8895af8877bb7a5c64f47ba2ad33603ca938de25fc8d3c139e0010a20c860312476c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3136696298affd3bb1a0aa86761116
SHA107eaebd745a2f49430b14a1a2b2ea024deac31ce
SHA2562e25e20941168fa4fc01b61348e4ea1b3f33ed1ec2b36819754530f88e26de72
SHA5122e0852793db05ecda704f313fa974335cac5aae2331dda9d1a136bac3333971333d9d6434d91504ab7ee23a059bc29164454c68c2fd98eacb2be0f7473e6c5ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e9609cf5d33135424b3fdd099cd9d4
SHA13106faf408d34b437f11e8bd96b3dd9ce5c8af31
SHA2564358b7b56c97f973d6232859846d75c4a3afed56ae8097c96a370a65031376f8
SHA512e2e325e6afded0bc1d429fa5f6a0b5b2c380b4a153dd0bc8eeeb0020933ac5ebae8670abc07292c223b2237a9ab305c31e5f036ddbf10e77883440a872e1e285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddcf097539ecec5b4d5f1cacc19d48f9
SHA13f771433f1e2cfe5faaa6a156b9659e1a9d8e950
SHA256236e302c42dd0b08e4e6c7d859cf0021ea55093046ffb8d34b9a8d702d634890
SHA5126f3b78f448a9ac273064857ddbd82a49c5316028415e97f1691b0944d59f458bb8b6151d081f45eb1f884c87bf6592a76290aeba665fddd7748faf9d143991a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a298ac3c98b1669d3d2a7ecce5bddd1
SHA1d7c1fa090be246ada70ace33ff86e02887541751
SHA256e61e05cbab8138554ca08b10ca373d0de294cf4ebddb8fa348a8d46b9d010170
SHA5122d7aa6b35101f92a880c833e5ec74abe2bff5879aa97a59307f244c65632d33d8a8585a7492671a7b9d56efe49f43f02896c05bf07961838f0039eb8b3cd6e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d504f655d5659ca076878423851907
SHA1e4bec389a7e343a2d303f3ca4f7d3773ea282ab3
SHA25639382eb620ffcfe33207e94b0cfc298a0cc8aab01a903a683c8d90b2f4dbe51f
SHA51247c5026b378cf567ed9a8d10ae80cae6712af14e7b5ee49acf4378ce97c407c8bbd6d24e932b7238caf6fff991151b52c3cfc095c1e3ec8c934cdd8aeceb3832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1890c09805ff0f6ac9170a44f2f37d7
SHA1dce031ecde66f8fd926288e5d0ee0d64861cc74e
SHA256b0dc3e163c5dd7771d5d591c975610ed260821da1170f57cc73ad4159c70c82b
SHA512a4e5b7ecb7e6442e6b6560e96f40c2bfd13cc31366e1c3e33e7b9fd736eaf374c6724cb6c571be1aedf2de6196ecdcfb4c75c26b270b606977142cdb8f8b877c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685c983cc8538024b6e317ba33e12319
SHA18e7a7c3fa5f8d1982bf7d306fc1b81cace19d8c1
SHA256191ad3c3f98e9216cf963218f16ea4e49c0725e2e18bb2813b17de8ea46ff28f
SHA512b1e906f8ee43450fb916f26058bccfa09b9db9b9106bd5a2d10f8dc52cea30960883af27f1c0b98a134890c10556c78c442a8e001ace839a7efe1edd8f7f17d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3a30f251e66f685f018044e2a2b29b
SHA1636b8e6b0e8f98331a48b65a1bd7c72383526a98
SHA2561b81cff27b762fbe18e929911d9523c496a85b26d8e7be29ab06ea7ac8430bf7
SHA512460c597beb4f443105582c57a73a7c961aed8c28550ea7e248b85154c09e3f025b20a2a097d716a70281cb66e6a87c1a2982a7138b8cc420f652526df7d9d9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52efe1155af7ab1932f0fe191950190fd
SHA1e67092e265d8d68f7efc8836f8027097a0ef8fca
SHA2566ec3d455e982a610ae1285b48f48ea1a84d962f2ac5198c898ba1c034dc642c3
SHA512321355cabd68a87a6f8a200d29a5dbedf380a491a5f955b9a89c8b412e07b5d4aa80650a7baf09c15480645682560b40f9f01cc8b78dea94a1aab0123c68da10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539fe7bb3da0c46ad24fab7582652dce4
SHA1d414c0cbc6b2e89bd221c447f05e9be4bd7ddb69
SHA256aea372e6539ff079bbe6c05b92ff81c250034270d5159139ccbc38fd03697ea6
SHA512dfb0e54bec5b5230d3f6158ea50d9aa4ef569dc13cc42cd115ec885760c09bc2b661158b9ac2efa24a4d078fe10739c7bff9a54d640237851739d412e1809867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942d6a94bdc140472d1e15fc5f1d0ed4
SHA1fb18f3c60194f214dadc6c560d9a548c8256a5bd
SHA25678ebe3baf6a4fd8c4fb15869bb139832fe93fb2eda0f99fa0d153cae67a45f94
SHA512ef000de857e2f3a3fa6b8038c564798aa1887e05d79e6dde6e6acdbbf7f409fa607c819d2aa98cc424d7eaab6e579f7754836aa3e295279ff3a7a567b14b3a3b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b