Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
eabe6ae77fd644b2b0c2fa5706d67392_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabe6ae77fd644b2b0c2fa5706d67392_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabe6ae77fd644b2b0c2fa5706d67392_JaffaCakes118.html
-
Size
68KB
-
MD5
eabe6ae77fd644b2b0c2fa5706d67392
-
SHA1
bd50eea338565101ef15a357be7003dfd1a30656
-
SHA256
66255db9cc93c5b795d2b7d434c121a98845b49c8ed17b9e74fe6cc748d7f5fb
-
SHA512
1ef36b65439178d3915e6e144aa84e274d68e14057ed6298b70bca4d45a3b57969557096fe127b7aa5566ac18b8aaa8cbbdba2bc7558b0f8bc71b63e66985347
-
SSDEEP
768:JiggcMiR3sI2PDDnX0g683/rz/g+BlBTg+Ba/roTyv1wCZkoTyMdtbBnfBgN8/lQ:JeLfg59kTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000006caffcd6a828f2c72e1894abccec3138c4f6f66ea7a63732523f8ab6f6b63512000000000e800000000200002000000089f92d18d5ec1f51a292eb39c596c8cbc14100ae2ef878dd301487ee3fc37dd220000000e8299ac994811b2810d6b1f7f5413cc804fec82b6d16166546acde41e7dedba040000000d0fda82b261d2ee4183b5195895c5cf4efe20d90aae7433633fd32c08e135ef3c0e1445e4c4c3e0733af29c30f0551e10769edec8af1b20598dec2eebdf6e171 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1B7BCB1-764E-11EF-8C8D-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2032f2875b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1320 iexplore.exe 1320 iexplore.exe 560 IEXPLORE.EXE 560 IEXPLORE.EXE 560 IEXPLORE.EXE 560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1320 wrote to memory of 560 1320 iexplore.exe 31 PID 1320 wrote to memory of 560 1320 iexplore.exe 31 PID 1320 wrote to memory of 560 1320 iexplore.exe 31 PID 1320 wrote to memory of 560 1320 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabe6ae77fd644b2b0c2fa5706d67392_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a670c4321aafec8a7d6edd73e9ee74ad
SHA172e91430aa1e23faf65d5a57001bc7e502bd9309
SHA256b05707dd1eb2f4e1a2f48b7b46dc8442cec0f8340ac540df5ca464f756d6ee74
SHA512ceb94d49fd87468f5d87ed5f0490ddaaddcf8c22879a596ceb0630e1ec36c9c22e075ebe323b3230846101e56968bbe8bdad2ea5a7f9013435f7a7b940febce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f26051bd275ddea7f663ba08b1fd2d4
SHA1ac26cbf67d51273c09931af2aa442a25de9c1b72
SHA2567340654504f953e193fa281f8d2e95d0073e5387127d3815fb4d9cf6d2338900
SHA512c20fd82d471dd033e6a2ccf43b1e3ca1f472132b7d7e65f946dc4e70c1edf34aa3aaf038035e13a5b6d5415698c1c2f63e4f62d87b3fdc054d2444e96d8bc06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5ed8ad455238ecf999b1a9597d81a6
SHA1b70e41c53ca2a8af51b69bab83ec7d76e8c63e60
SHA25688c3dfa6734e17451ff55263a6ad07ca3ded5989217778dfc788bc4d501a9c19
SHA5127a60b92a888b797ea1226234605e8bb69ee2c9e1ca081b21218bf1cb674b92915498357c1a0d067ee0321c26e5e33fd92632534798a67a61c58152057834b13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427e3546776b0ce0a7d71acf01ea59bc
SHA1a3829369e440a53c75205e7dc2ec79216332ea2e
SHA25619aa9ddcf9ce6e9c498ab02fffa46acd03bd012fc5f935a5d9028044f797bb91
SHA51249c9f67595c8f1d440b6405353de8118af1583248901c96576bfdb7315c18f04852b0a9fa689abe51d27fd637bee1abe5986bd589ccadc3e977204a6bf9f0801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704dce39fc473ecd63d02541c1f8bc77
SHA1c934a5db14a28a2d0523508e24b95a2d87027a81
SHA25651d338d33d9607db1f96ef55d0f34634655b9dd1c089b531a5e4c1fe24cf5c29
SHA5124f7bb00cb75828cb6a6dbd8d25c69f186204b7d47ff1b56fc1ef3a5746a8be18884b4315eef46bcdc736acfae1b01b9dec8fb5c7400c9d93b630ec36dee3d48e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52248dfd432c33c53a296c6d7443cc3a5
SHA10555e36bc254a0cefd225ec921ede31ed1fe5624
SHA256b6b07ab7a8d8bd32b1fc4cd152c690bfa279b9e1077f4fec54284c8c742c4bbd
SHA512dd6430c61ee99ae734dfeb3fd1b436d21c1d14fb52bfa02537fd84c3df70a48119a58ab72f9f20465ff396bb2bdb006b0d79ff6d9dd3dec639def12568d0ae6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261f76d9f9c04bcfb2b6d62f9e85ea05
SHA11fdca23744835b288fafcfd7e28143984c62b968
SHA25635d3293c9ec5dbdab5c4994d412109c8a1a73495f91587d891cf3bc3fb362442
SHA512faa1c4e0ac4c6378beaeaf1ee95e018421e470a3021fea7e27b2a6311a3e5d67efc3beb48de7927bf37d4b959c271ab35da5fe2eca5665f21481248d4b0563ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f96625a24cecf20a965dd2586a2d6f
SHA101c56ec4d0203698e5d39769fc0dadd18165265d
SHA2568b9be36840faad72ca08846a7b3e5cdede6ba0dafd068d5a70a0bd56bc45302f
SHA512cb8d894184e2333e24e8330f33bafe58baad0e2f997cd92b49bf6986f56343b6e29dc774414aeb28963d526dda8cb4bbdcf4c670d7d47cb4fa89328fc9de8197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f47500948e8e3b0e52d71a29b988a6
SHA15efcd9555375309393fb43417e78177e3d9cf1e4
SHA256c57e01fbe4b264906b6e53a8403ffa643fe228a5c87e01f3689513e0b778c76a
SHA512ec1b078e3dfb49a37f39b5912e160c20bd07b0b8a5aae0aafe949004ac37d242c10e99f1a8baeccc00cccfa623ef1033c4f5dd9b6603ebc0e3c166bac8405e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967fb42837ce1b19175b7e1a1eae910c
SHA1e9f04343e10cf8d06c276fca3c83122d8687a1c4
SHA256bd459438e159633471bd984b1835d1a6a5c6059931dd03b9838a260465b2443e
SHA512c3fb6910ec726e038f272e45643dcabc6a44cb2da72e0cb3be670af43357980d1e295b9baef1b72778be8306c3aca8ae1e805f6b9856ac28b24a2cf1064e71d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53798e68232380bcfee3d20fb054a9514
SHA19d4a221608d24247dee8cbcdac65b20e60ccbcd4
SHA2566cc47093b54fb22bb10bbd13753ea810d9e28f7c438d048c8f7a323ad20206ad
SHA512fccd46795bfa42b9df1aeba8b4e7b4231d48ba0969cf59736b934b13237c1cddea288d76b8c5064a20d290c663eabb3e00e1e0c6aebf6b8e211abd869e77232a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df54cee10337e3ecab94c37fef48a111
SHA11d4060642a7b614d475db6b9a052c4eec0b5d9f0
SHA2568ead67d1c7b3b0f2f3bc69c0e654788bb0b751d4bfbe8c29671bf5242a87668a
SHA51215b5cac486dcb6fa9525de8fd517c71ed2f30b790818447d896c6d1d08e5aa123e472defe93970321e7ad48f4befbc2d626c7a999a8e3e37528fb71ff395df23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c07ddaffc2c1793c24f20840ca5f38
SHA11582e1d86bb9fc9fe7a989893004c725e2e2f5cf
SHA2568f449e907054f824ce7598adc21b1906e5ba89400ce0a1c901b83c8dac99b62d
SHA51219f0ec966c047ab0cc4c36149db934a80ef49585a5fd4596b4fcb66e47c83c174a72006e2193b5a4cca470585c7149c55838a107b8cdbef61e52d455503bdb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a908c0a2d34e8f67d5bd77d4f39a658b
SHA16ce21f148996375cf2d05f3bc9e7b9eb5b41969d
SHA2564291d0d46165371444b371d6e22600388f9fa23a05981d6f669285d9b1b84d8e
SHA512a94b9b0293401050aa20e55dca6fc6e61637952e09f19bd5745e92132c3592d4ed37c2d37264e8f9a8da4b99fee7529ee001970221f3eec415c42efbda5cc812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51058fbc0cf62026c64ee19301d96ec3d
SHA12c037e0d59bb9cd0709942e6fd8929a20fd11647
SHA256041ee45b52b8a2cba59b7075eb7be34af28247f1d42aeb07e7755137e229df71
SHA5123d7a68b06e2331a235079e6b00ba242b56af38cb2e78b9495d0f9fb98e048e75de9cb7a7478985a7b51a58f49c1ededa46131c33be089dce0cdd2e74debe8e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967f45c86f6d21e8e5dec150fbed7b25
SHA187ac4e1e71fa4e44c297d738b5ee09f0e6b605fc
SHA256e58017098f2ca68ea90bfeb92068d5b4583fe9b9d0d4475a5595fa0c1326a7e3
SHA512370757fb614a22bb365bf8493209e62bef6d7e62eb9d7822e4df1d6212445cdc915511f1e7bc33c4a19beb62b28c8a0bcc0b955f54b1e1d1e7ae95906c992035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8613f802ee3286ec67994af551d5639
SHA11b08a9fca525c67fcb6c3b1f926266870a474e0a
SHA256ca63e13254c0c87f988a0a20b17ee9139c72d27f2ce3806ed6b0c9086f4b4fca
SHA51268698769dbdc76335c9d0e53517edcc1cc2738e8151aa66cdd5c4bc8bfa52525fd950b37f90153ff5c2d28bbb1b0a939ab1c8d205d595adaa1b3e4181ae8f2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b508435fddc79743810b688a71dcaeed
SHA13e9c18c671541dbcab6b1fdbdc0a4d474e32ab27
SHA25631c07c6782b8488e054b4197280721c590995ce6af86d2e61ed76f041443bb52
SHA51287abdbdf744c13ebe9bcd80a79334c299ba7ef9fb18269510191d527f5bec7071653e59c1a3fc432657878baaba21b1136568f60b344c06041bdb09a5f2010dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b