Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
eabf37ce4e4c38ea6dbed02bde2dc070_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabf37ce4e4c38ea6dbed02bde2dc070_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabf37ce4e4c38ea6dbed02bde2dc070_JaffaCakes118.html
-
Size
34KB
-
MD5
eabf37ce4e4c38ea6dbed02bde2dc070
-
SHA1
c2607909e1778ec5aaa571a3cae75d2a8c15b893
-
SHA256
db0a6ce53e6680b45318eaf4684135e9c3a95c5e1bb6c8c33f126a46a95e33b0
-
SHA512
877a8e8e9ca756ef056f90d41a0d93b9ad566bd66a207eabe2752195af828a78aea1c748c2017bac99d1d1cca6c9427d2461c5cc4d8149052b1cee4a533f98a8
-
SSDEEP
768:n7EpFwSXe6eDewe7eIeygjI1VCJC3CNChCICrC/CvCPJExBq0Z24HLx8lFzFn:nwpFwSuDqtClpjIjEWmyP84yiJ4q0Z2x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000f99d0186a3ab491a2d8e0cdf839d09067b47a5cd0d22585256d3bc332e87bc21000000000e800000000200002000000067a859b6efe8e0ddaefd18e06b8e87f74e14faefc6a66c7dfb0ba4e1c494358e20000000edb55e18792e23e3904da77c33bb1401e61c08dbaf39d491b684c23103b00d9f4000000047a869e5fec7875a7653b9039ecfa91c49e82a140fa5b01dd3563ccab88882d02fe9fafbae7186780d56f348aef9f35c53431db803a378e4e86f799c369de6d8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888609" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F49CEE1-764F-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f09f1ee65b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2164 2440 iexplore.exe 29 PID 2440 wrote to memory of 2164 2440 iexplore.exe 29 PID 2440 wrote to memory of 2164 2440 iexplore.exe 29 PID 2440 wrote to memory of 2164 2440 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabf37ce4e4c38ea6dbed02bde2dc070_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9da91d6c60f4cfb3fb273f0f2d15ea
SHA1d026f0680d3f5659db7135ff91b513c4eff06605
SHA25626585bce0f24b846fcbe449754daed9b1efebc051839bb2d256555751c6e85a6
SHA5129c9854ba568cc26445e59fc0a34855058fd0c334821edd04c33ba01b2b7c46bdf0660e40022f7cb68ed3c3685c76502ab85a3068d12303b5fe34f4cbca56fe3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49a4fc9a24459c44d27fcac02b65a53
SHA1be7fb0ba0ee48457abaf98571fbc26f07f2c00a1
SHA256d2e319e3fa9030aaddfecdc96474fba98d6a7f6fa8d709b82b952d793660be71
SHA512511cfca01d9e34ba9c1d80c90ad36a8e6192ce782a0e2615cbe2f8b68e2615941e3ecdd881dd63b0a1702a56f76748a52c1c45f2362fa700fe63df7bb010d68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdac6ceb5913b0111ef2aa308ef4a53e
SHA1179e730e37f45d26732501981b3714fbc41d20be
SHA2564a1a3d5ce4b232187cb583e8ad0b98fdab4d21453b69850ed1172e0b56627d3c
SHA512df62c71db4543f5be3820bbfb3765b317c2a6a82fdbe92cf2c7ce5e4139c1b3a9c0d3439bf2cbfdcfdae14cd439acb2b49882f764e8701bf0fa31dcb4fd686e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc13daa2c6904033a200dd78518281f4
SHA1bc0794d941841069eddd6d14b87664d13cb8c940
SHA25671060049238474ed45e18119b406633ac14a04dd0a6d34c21c3fc690ee192476
SHA5129f2c5b524ab240d040d1443df6d994ebf355b0ecda557802c528b77efd5c061e0c2c84d5c0a2475270043e7a920287dfe1092b71e3219c6b58232615ee46306c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5387d048ba833170c1d1568e4928bb5fc
SHA1e2711bd5b2f116fe5a595cdabc41e7211d4fbe3d
SHA256589696a9ee3d2fe1bef9c3e1d770941736c012507b9f83624f63adb798c66436
SHA5121bf7624678cc08527a183991cceff6f53c2b7995afac9bc042337053801cb0346983d8fe2072049e8cc590a382c40d18a6e17a8ed01b29e6d6430055b73c6151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183e36bb5deb211014223c2b376b66e0
SHA1f4ad90b5b2c799a12a4eb82cd2f33cf505a8c5a5
SHA256b4b5cb8da1a853c964898615b3b5e8586bb16a643f8df24e31d7961654691557
SHA51221f9ebfc84e0a5d9585bc95ad1655c831ace58209c640b8be0194f2eb391f65451d070455bc54d6722d4a03e6c5beecf5da8991b1cd22c617ddfc38b31230f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f9ca4410e2e7609a5af02c87071c1a
SHA163a7a708233045880926e0675ba001ffc1ecaba7
SHA2564952967c8f4b21f36c6c81417541519548cfcc17f23b069acae380868e277ee4
SHA5128db9cb8e9f407c54c48121921815110cb47d0410925bf0da698256329b7394056c0952903a0022fe5a24c2df86f028a6162861afdaa9845b18f54886b95ec829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5be55d34991729a46282bd2eb6c0b4
SHA1d859d1783ff032d31c4f44a336543efd16bb1d7e
SHA2562dd72a173c2c422bf2750d85ac5437507b0030baeb8b7454a243d969ca8d4a34
SHA512ff5f05e4e6392785de21e0d9aca6b197b2782c44c83d714220050fa7241b500c846ee45235805bd0173c9c70b4a99ada37f0629451c5f21f3273c236e4e0451c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f305a49e02ca85b49e36210ac7c6f4a
SHA1a0a8a2428ee7d78feb97d1f43c5cf4926170179f
SHA2569c98f4fae1ce64f523a4813cb051b2b0df8b15f72af8de18b85dc47cde459d6c
SHA512df298002cabdbb199094417d605b9cc85a1ecfa8459d7b27b93a64cf726b2f8b355a426db57394b027b44390d4ae8805d29e6d1bb5e79182cb87dd3f29ef8e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51796c8abb984d340ef470ff41a22311f
SHA11e2ee1ef1fc9b687fde946d2ef851f7166d47aa0
SHA256300eec6baea83a97c535eefefb6dc8821c2c90715903a24001f599241d89527d
SHA512b2d458a545ef008f2ce46a35a088631087158cf189b6ca8bbc9f891cb5d11208cef62acad3719b9e5606a19ab0740e2fb6c73d46e771e382d2c27d90304bdacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878ee058d422f648d547dbd585ddab82
SHA1a6413ec2eb640dfbd348c171819c12162da42357
SHA256a9ad99b97f68fb9a058e7035ff156cf8025d9d90ee547adf79a1429f045ffc79
SHA512208efcf8b3ae6b51d84455269f0004d408bfde3b8261bb07be5e1d7d8dd906c46aeab741ae503acaac6a8358dada44dc809d8eecd23b97cdbc78bc617782a51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fffb0d5b91bfd38a585f8d07ab386cc
SHA106b136c92fefa0ffab8305f1664efed8dbe8fb4f
SHA2562947fda441d41bfad7dc097bf8b82354885578dc99e245ce7e1759a7982ca75f
SHA5128d961cd1caa05c91c3ff6e3f9e9066baadf739102a9dc71d0be46f37ded45800e2f2e808a76167716013e1cff87abfc9f28d5da6c52eac4078937e940802f9e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7995924fc29db25afd06f2c489044da
SHA13cec59ba62815d1ad8c068fc0bdf18b5ab5681ec
SHA2560fcde093b4846c00a8ebd411966027600f6c49edbab88341732d56ee81ff237b
SHA5127853aa4274525f5d5403aa687efb5640ce809ec6df041b2bb742d90b6438511c573d63877c8d4c9d7cf6ce1368f89d819ee5e36a0c1767b0594a662a07e51332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e944ea6b08bc5c25f125564516fc0a74
SHA1a43b9b37429c221858a94a4a9e1a640b2090e34c
SHA2566951a238b1256355af2c9e1ce8bb0a888d1f30fa5ac16201f1a8e86ee7e60260
SHA51266336ec490104a312dd4671f00ad7c6e8fd9addecdc0b6337e54207a3f29345fd78dee4c702425ae9acf00dc14e7fac882378ca6d0d6c3248774dc0f095fee18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab83ab3a13e9f900e515452bae92743
SHA1bd3a294c8ba067e924ebc6fcc93a244381a31464
SHA2567451f940e1055c228c59491fe98802f200c934729d28fccc641868dd6852a830
SHA51233758962e8ab2c58225bb133743f356d882f539362642f20ad29573fc8938dfb3b8b7bb78656f706a7bbaff8e64de6d706240fb92792e85e899adc2d2061cbe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c321875fda8cd70b69e238cfdc2a87
SHA1b24490a058689eea69df1a3720c04ecb6bab9cc3
SHA25624a765f795b5f6e579c09569bf0920ea80944deede445ca284ce59e681d56cc1
SHA512bde7b744df427b657635c86dd506c64f5a9fb46720a74d1eeffd83e6fa3ac046fee7195c9ee35ebc5a8f62ca1433cfaf9d4309afbb2b9e8959ec3940eeab37e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50214ced8cd7707ab5280118abf50e386
SHA1a775841a313ef066742c1a041b4a7190a1a8e015
SHA2567c2688920b7aeb189971d63212baf253521e0d118b4f1a1dc17057f1297934a8
SHA512dcc27b8a5fcb5dd9038b630213f0a4d3f47a9fcf462a24c8b93bda7b654efaf1ea9ebbc87ecfd88379808ce0173cbd03497e802070f9a57f07eda55decb5f171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd561cfd3cf9bdb8ca48ad4a6f317d7
SHA1109aac62e437b926366ec2aac7740eae36077f31
SHA256255f5826359f88fb519099c98f09870502a7caa62b76c1e6c9bac4d9ac1c39ff
SHA512b2372d6ac8b9f15049ead0690dddee5eec404c9d9c87ed62df41a765934ecbaf764af17e7feaae4a821e86c08432cb90ef848aed5e8d67c1946af61b9db804c6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b