Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
eabed31a1657acb9d72d3846a2a90db0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabed31a1657acb9d72d3846a2a90db0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabed31a1657acb9d72d3846a2a90db0_JaffaCakes118.html
-
Size
21KB
-
MD5
eabed31a1657acb9d72d3846a2a90db0
-
SHA1
2a66ef754b77a6467e601a78b373a6a1a93cdadb
-
SHA256
46ead4a3bf9974ffcf713e4b109959a0ca9e7852b572dab6ffe1e4f6af940dc0
-
SHA512
94b76dd12959ef19df32b0e8b54ccbb39d81d21b6d5cbe4794fcdfaf464d486fb2a187b161c6f7c17798fbd30ceb42f27cb0466e54c5917ee6c426f20c64eab8
-
SSDEEP
384:ziBKcRAa5r9DIiXboVBD8c43R6VuX1kX9fxmEfP4ycbp5PIzVcrIDJZTO4uq:ziWa5r9DFMgc43ku12pxmGP4yK2jJZT3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d973b25b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000110b6ebe68159649b2be9486de3993b548a41a80155b0f3144a2c2024e8227fc000000000e80000000020000200000002b3a055c58ed80249385b887f22c2c3e1b825a575da354a0cb86ea7cf97dd0312000000006f02f744834b061c9b1ca3e8a5560971f08fb6250e990071e165a10be6339f440000000839e413ffe31f849b1e64e8ba4b9a076afb0c0d2a0e20b202316c797acf26cf041934bd579824b7ab70804829108df56cfe749911e092cd14f5a5c9c77ca3af8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDD0E421-764E-11EF-9527-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888525" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2788 2140 iexplore.exe 30 PID 2140 wrote to memory of 2788 2140 iexplore.exe 30 PID 2140 wrote to memory of 2788 2140 iexplore.exe 30 PID 2140 wrote to memory of 2788 2140 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabed31a1657acb9d72d3846a2a90db0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633d2de796157b9e22bab3609845282f
SHA156b3dcea1e02037878c8c701ef369f029a3b6c5f
SHA25698e61b10301685cb879e53cd0a1ca14cef8684deb4ada1f11e1d07e4448edf26
SHA5123498b255ec8ef14b78d3c701256b57582b81d58ff278ee7dd1ead31ec5eb028174a57320ad9934feef80a32d8aecc74a801be7362ba5ff9388c31d6c5df204f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fae50cc475a0c02e6e211443bedc9bf
SHA1a0efa5584ca424fcb60ed6c1f918324ea35f357d
SHA256bc235ed7863a51b775f0fa9cc96f149861a5c817410ad21a9d139fe4aa746a35
SHA512e00e8211e9b0dcfe4805cf9aaa940a03a11d005e3c9eae5567fbc1317cb2f3885383b65f985d4c911ef4e050d54c681369c415d28e0f9214aa42473796c72795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57042e7717c2d501a58e5a854694827cf
SHA1c18f20c0a7cab87dbd8b55a4f0906b6aea48e6b2
SHA2564cd44452da6a6938b1b607539424ee18ff20157aa0574d4d25254be0cf6d1d1e
SHA512f63368cc207cbbe6cc0c0954d637b5a3e97e04e9de2d57b9695ac6613addb83574fbba493a99d8e1f2a396262cd25a3ceec64451623ceeab2325af8c3e06663c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4eaab6b01fd947c9c894c6da7cce76
SHA1c38b0c14d9f6f210af48a453b7cc28eb0b873ab4
SHA256ddd7066c49fd10e46eaa03661918e6bd3e636fd117ce98aec3146294b8179604
SHA5129134a06bd64e4522858189f0a60c0e3503d0f9ccbd9ff52f82dc5cb0eb8d09fd77c8cb68815cf6da51f7874e9a4112a1ae43a4061047967281f159a7b790810e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4ef94c9c4150729559212240290211
SHA1bb697571f21154f5bf1382c8df4fb6a63d9e9786
SHA256ee553b432badbf317709e03c411c0e3f36d4f620fe300dae36f43b1f2650375a
SHA51273aa19cca3cc446996ded1d77c8353791a1f779a3235b350e5c39c5530d74e0e6648fe7ef826c71e0a0a2341fbc6d1fed8a4c7c83504df9bdf889818955264e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e1527f45ceec245550b4a12821729b6
SHA125be3b8a6032f1b080678a133641f7ae2c7c5cf0
SHA256398a78f9b0343320a90925a1d6d1736d15392b4b85a03eb0eef2dca4415a080e
SHA51268e57f41714a6f941629058c56290d0ed7ee025078d039af9d1f1eb5db4840da9f210a1aad5aec432ceaf0765933f760b8c2d8cdb1a800c5bf16326d52288eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2c340f1fee972ce3400df48beac9d9
SHA11bffc3fb32c7e2d0ef6ac0f762a9ce79dfd83376
SHA25617ed95277fcff06cddc74d74b6ff43244386a6ac83a5748fee76c2863124988c
SHA512c10dc42a4e10d46eeca49d079ecc6135c356092281de23078b95ce5b892c97642dba2bcd32e306005b0937e920d54b8fc9027c92dea469e17c917b9a982bb976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbec71d7637fd2ab459725a3f009a819
SHA1ddaed9a92b0dafd08be0c894ca62fb51fdeccd25
SHA2565802058f28036dcfc3082a7dd7d833f6a352047cdf1d35501f6969fd609b2436
SHA5120418a223f88cd7d89e7aae8e96b7dfd9822da39254ff3ff6798b7443b69448d091cdf954cd36e8096cfe502e35eb7a13df50d4084876719eb13ad1c74832843b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d20435f9b5ea2a6e6f17054764ea5fb
SHA137bddbcd2f8910e5f7041aaeb4aedc9b73082dde
SHA2560182fa39e6a88ac01c682afa067ade295a6a1a29ff9b52ab8c82875b30595c19
SHA51210be10de103f202b8bcd7535d9f3d754efb07ea17d96f62738b6c5c1fd4084a10c0cd6949fd9bd1756625af13701ce993f0e0da0f0081874e3024ff6a565ee1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f354e9fc9cabbc528b0c10248dddfad
SHA1b7cc7d9a56c2f90b4a0e152f2be4d7a2ce5033f3
SHA256529bb0e67c191d4b3112b1b52e0f03690621735a2a09c4538002e27abfe9c448
SHA5125c5cc2a9e86f231ad907e24efbc0e66080ee20291568b5b134c8297c2c412b18e3a82527ab5cf5f2e82b38aa0ccd8cb293fc7ff8d2c7c8bb81532a812728b1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54093f85560769ff427ed9f0912759151
SHA1682b31cc32a63f169dcd72ec9693e6844dd231f5
SHA256f5b1286bdd6200f820da1f0922be84ad0bb820e7936d1b6e5f869d4ee298f766
SHA5125ecdd34acf61bc68adf4fccd0ba405d30b2fa3f76e728aee7154fe4b8ced414796fdd3a6660ebd7775e5e4571c0ac3cc1b5dbc744bb69165d944c2b5e16afb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0032208b0b8c37d1fdfa9caeb12192
SHA17ca32050a068d6d9b15cc62d3aaedcb87c5aadd6
SHA256e3b75161f55d101078e5ed60e7a110618ab9ef7234f8b37d6986da65185c496d
SHA5122320f8860e7809dec07bfefa4eb4dda11878489342fbd7b61330e352436a3eb7bce05cd789db333eae81246d63c33fdecd969362de6a5a1d25510f833857bbbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b567ce4d15ec9e8aabf0cae848e0a037
SHA11f8aa821c15939fb1270b15c466e3dfffe987434
SHA2566b658a6d408790ca42e5a67c263d63187fbee6e9c95cd7cb43499875eddd9036
SHA5128a02f28912ecb685b8c04dc71869a574462c6c73e5339e4d90ca97632b7fc43c59c5c71df287e15555c1184ebddcdd3e9b89612fb107b7f8b170b650d3a67175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d2b4dc5ac63a21c3dc70d6973cbd352
SHA1825f6875d080f2eef16ba8de5ac0501c8d669dc3
SHA256277ea9521d384e4019bb4343176c2b74bec436cf60c19e4b53e7bd97acaa9bb1
SHA5121d684f195b863b56c22af0cda178661fa33ab4ecf4d9717d4918ea37ea62ff1ae2705cbf528af5e1eb08d094d1992be76432e37a8a2f90922bc1f3cd94492af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd705ebe829c1912a141fe13da00dc9
SHA1bee402d7f74596d01f94ff6e4a71b267293d09bf
SHA2564d43b553c5db6d50f0968fad5851c6596d57b23d438f200a9e402bfb3f1f0842
SHA51203d1ac2528f10667a2693e12f40899137a86d8917fb240a38f876f2a4582f377c023f461dc8c9571062aa53c542c0def73357f0b3e977178e859e1bf9ed95077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c67b6de47e17acb1b71ffadd71b56c0
SHA17b7b257782c02b774dfdccf27e521d95436b1d80
SHA2562985a8b8113ab2370ed51379dd132ebfa032a276a11ba276bd6f4de1ae04c52e
SHA5128a9148c501b3beb90026989558426b52364b9406451546962644fd23363351e1e137b52d7a47f01d7afd27a7f831ceb87d65f210309a142392f5d3e66f9e7563
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fe6e339247f3597af43d2f08c0c2795
SHA1ba0c38e4361dc1d272398da399f5a15f9f2b2dc2
SHA2566954d284f0c1389404ffc4bd157e2a35efe0625b6456c6f95794b8af8a2246af
SHA51200a4bae75d2444458a96ad53974953e909bba3ef40bb8508c9f6e9d3a1244da2616af0a337a2b8849da0f2a47df858db5030efac0e266b47562818e16c761466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527283f17bcda38c4586a0f85bb272131
SHA1bcc3816f5270cf5df0095a95305828ab1989208a
SHA25649aa9ed8f0a004459cb080c35edd1919b395fb2694fab14d068f14dbe24d7227
SHA5124e41e8b42902d31d63d8b2b5a890c970a88a9753accade6054b01ba6c835f07410d401eafff711c42a57a58f0124df52e55d2304619d49a4717ae54f4ad918ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54acefa350a5cb85a44ee54a3fe4c48df
SHA175947906ed4e6c9173ba3967ea948aff0172ff79
SHA256a610c8b9526ec0929f0c333fed2ed5d957c994cb9cc790ee4f162014ecbb1592
SHA51289a905ce517604edf198b50a114ef69f60dfe788fae8502272adc61c108fc94706b4841b6823151002ec20a21c31563daf145854ba7cdd2ff582e2502d27c85c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b