Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
eac0b11245196767821d16e5edfd5c1c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eac0b11245196767821d16e5edfd5c1c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac0b11245196767821d16e5edfd5c1c_JaffaCakes118.html
-
Size
461KB
-
MD5
eac0b11245196767821d16e5edfd5c1c
-
SHA1
b5d7b7599ae8f61bbd430f498a32b2664894ba1d
-
SHA256
26cacb92dd520a3b1ec0f2ba4e44b87e95f681684fe6bb2d4ca08c53e64eb97b
-
SHA512
e21bae37206b9480f7cce0d5362dc70a3c418910926c1e4e636ea59d053baedef822b0f485b75ff50770056130461a822512d43e47523976ada1ee4685e08824
-
SSDEEP
6144:SosMYod+X3oI+YWQWsMYod+X3oI+YYsMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3s5d+X3k5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888865" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606977805c0adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000263aa84380d19fd6107be952435bb669b2f1094040f442abbe63985233c6b5cc000000000e80000000020000200000000b65d297ec5887967e897fcee399dce51d24a00e95cc632d2ef1ed0e619ecdef20000000e954638981669d75280f145f4921462e49235f2eb5145936ef5468e5146aea5b400000001349e1f98508c7aa80f7bc910bb6582a6e2f243bea8a551f890079304f954f8d6fe5016e0ff79ef3fb5b733311227dd5ec63b4d8bf1a0701e75f143d20c0a33d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7E30631-764F-11EF-838F-D692ACB8436A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3028 2736 iexplore.exe 30 PID 2736 wrote to memory of 3028 2736 iexplore.exe 30 PID 2736 wrote to memory of 3028 2736 iexplore.exe 30 PID 2736 wrote to memory of 3028 2736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac0b11245196767821d16e5edfd5c1c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3999cd4e6949f9ade975aee04f5eaa7
SHA151e46cd25528090e21eced6b8ff5c9f30d4555e5
SHA25668e7f697d193b9e87557263633a7d6da449a223266b8e3f82011c3c05a6ada43
SHA5129977340b8afb4248e2dc468c0c7af395be082660f8512ef5aabb28aaa3726434e6e7afc8a781ed15bb0b0e23e9367f293970dfc73c4644df0ab871108d4a6265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0be1622d16d6d07de793ea0324e54e
SHA1557c07f8f59dc60c473ef4a34ab4c8f341158f3d
SHA25602130ff5529eae1100459df37cc03a21ad98dfbab7c903cff7ca9ff96cb21471
SHA512a5ccde97e62e46fb660da250dac82a728b7d3647922f64ab48eacfcc5432b50de2d2c2dfcaa38f84dc92b0099e35cecc525fedbc8bb4f4f180f337e419078081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c18e10d36316f7c0168288e03a6525
SHA1dad469139913e358fd3990d47d7f9d9466684e75
SHA256d64a391104d14e6127428323d0ece2c49809b10570c42aa15cd1b2d45a1f3bd0
SHA51209485661c6f3f9a6c4e04575cc1808d93277b8dc31903c0b0ce205f84f6c0dcf69a78daa893eb1302ea13999b791990c6e2302d051f22c316456e8766d1e7526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0ea73a976c841ef54abc8348eb38e2
SHA1e63e93baaf4cfbc407b2046274487f317b339291
SHA256ef55d872dc7fb871103eaf347707db81a135f5f02f685a57515827249d42d4a8
SHA512ac76ffa895be0e023a8b0423fb151f0080f25e88eab7e7c84afbfaf401f26691ee29afeece3b39f3eefe50b6597bb2ea94c739451fdfa40ab74874e04b35df09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65bcc32b88ff3af67045c6e8d07cce3
SHA1792ba66f6b47e0b2402df9c836c779872c9c710d
SHA2569a9e48aa7d49ae710ba9762581f8d9ca4f3ac994c9ecf3f90fdbc083ff500149
SHA51217b29a068d36633cfedca86bee02952dfb30ba35c51750567fffaca3e86213aae045fac568fab35d1aec1e176e4ee73f27bf32251225c4c6aaf04f059053c5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31f0121f53847d8146ac80c0cf0f162
SHA188a5d0ccb6a42128ff820973938e03c8bae1c982
SHA256de5ee683500363aef9147fb45a56dfdfc413e7efd408388ae218c6a82deed2c6
SHA512ccb722c7c0e5cc3ad06f1e974befcb51098425864d41da11fed13e7260a6f2d349240b57e040ac548b5473647ad7e26dc3001c5bbd5b7f6d05409dbe44367b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad3e8b76bcb776f41023871a43acbee1
SHA13e532962b5ff5a30e4ee0ec77c33cb7788195009
SHA2562df0e8e4e72b66ed214df062caefa8847a495b8efb0a1642df0baf494b4caaaf
SHA512e7adc659e76810cd79db5e9c90e27c82788efddb0e045b0241010e444650915cab5dc2b3336dd66c86c4c480843a42a279458d12fe7a73a2fe02b69f13a80441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52175779ea908987db2f5059650d73acf
SHA192bcd2f955c28f259362a2dfa460d8214cc6b06f
SHA2562c38f96c7fa211d145ae6ed2afcafa021711ac67dba06d138ac3f54876fad61a
SHA512803f0fd763c892db18aed63f29ea9a0a7c611995954d1ff6c05a4eff694bfa8e7fb4da85bc0bc03cdac0a89ac970798f3077e063870e377a04b22017dfd2785c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dcdc7c9db984f43f871cf65cc44d721
SHA1f431934d4e929a5938d32f8037100b2e11f6aa16
SHA25692662b722109f56ce3f9a95fc9adbb9a10952bcf6a4a05e3aa2fb6771792a572
SHA512a2afc90d0fc61f1e145a573f6b4eb9df149fd68200a78263446f5eb4f41f588c89c6fe56759b8ab9fcccdc25a2a17c028530f93440983354090d1d094ba28dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491c14da968292b24f4313f774cbb1d1
SHA1210ea5ae72c1f3cec4b5cf9bc4b6a70179c49b9d
SHA256c332a42066f125dbcf2ef696261a40a4f1cfb72c07a51f8218267a5b97ee658d
SHA512cc7b236af6ac39e92b2316612d8a79f0698ff561763ab5dcf4f165ae80e74ea033991681332f11a9e1cfad4abf9d6d23c12a5e99f76ec5e9b087c9a834900306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd7740684ddfac13bf98f7f23150049
SHA18a8c36ad5d4b77d15ca3677d279f3d8062dd630e
SHA256916f4948f93295698aa5b390709bc3976f04bf1b93c1b8da8c4c5cb24cba6ba6
SHA5126276eb3285ba29aa51a3d85edbb33cd7df0f95d4f5b4518162358c4781224b5af34484a3e565585a0bf7f6022335b259005e17f07b36d7e1b6025448a56a279a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8605506bd837b85f2886ff57e69903
SHA13f3d12a28ab7fea442d4db0916cad43e762dd252
SHA2568bbbc6d14a5cfa67fbaf76e4009a91d2d12924d8ef2741579564903be432c61d
SHA512016a704b832e536e553fb812c7e2982000627d7d7d746ce0b90c8174974d9688762eef9e0c0d4bd817ee2c010b7922f9704139787615cc7b4b406c7e18daba55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541bb06f183296fbbeced8b829c952708
SHA157037c386d61f3894dd392987b8f1bddf566acf7
SHA256e8992413c56e29b42975c70fc5c1faf7ad8c76287291a73048f6f20f320e0dc5
SHA51268ecc7e82c88870748170d8baa864e2a1b06fcc0559b6abaaecf673b6168f8f0bdfa9f53571fbb69c85aec5e0d884ede853d91c2dd8dfaf7d439b2977046c8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b1e4213593ffbde75b7e39300f1120
SHA157ab8d30844b555bb04e7e658ab0d532ec18513b
SHA2565edc0f8ce98fefbf2c0a5e84248e54122fa3d169dfdf431e62ab6f173f990219
SHA51240db4527ac04569c98cb3f1897c4d0738c5a5a037cabd0a772dd24741f1b5740dd1c70bebbce7cfd02e813a7413e49248e7af4d078634175f81c103dfa11eb2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f96cd80de715559081a0b329e24675c
SHA12cbb7069ac478d85b4127b0b72e7593c0b815be9
SHA256d3f79dc5dee9121a4ea2ce646e2a36fe4072d4c18628a90aa113ec0eef7311e8
SHA5126d871a039e3e2fbb33fa91e81888fe8e9f675a234939b3965837b9be2bc34e6318b2f7b5b0f9817cd892545bd438ea1fdd20dc3a43b8489b04280361a4a25ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc991cc97a3679f86cbc1b9672412c6b
SHA18a382518db618a970c3a4f440987e54629b3eb21
SHA256d7fbb0870a5977938426622544b1a3f70a84fc552e3d1fb56fd3d6a192f4d520
SHA51202c7c944632cb50a8d8c471509c53f1eed04eff7043ebbfb11d0560d011d763838b4dcb69e22f9b313fc159a0990ed75d113c9198b2570b2e9bc41deb959c566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd6aa1d5a272c3477b8a2c2d0424152c
SHA1363325426f618fb12f3d339f55efe968ec7354ba
SHA2562ad437b73d13410baba951365d9164766755dfc0807682b0f5564897335d586d
SHA5127216131d1612a30e8d73b01a5fcfcc7e66a6c21b08a017fb420ff980b9ac71f823f28e08d84a0609d655c43e4597f9d35a19c9d4e0acb6b1b6bef92c777f3f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4838deefd5e6d8d685b82855bde33e
SHA1e670919cc561cdef7a5f90b6ab2519cfbd5b0e8b
SHA2566e858cc14aa78cea32d5e0aa2281b687da6610ebdf0ca0e9ed85b99537cb6d03
SHA51212a86c66b2526b8d1d33054b8497f3ac8e7b49fc576a79d407cb2efaf4d77cf638fc35cf753778d5b2a3ebec94b93df3c3e569dd3a4c79d45d4b2b4c645fcd86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535dc65fec0d264fc015f9867a98e1e06
SHA170189df5a88d95bb3e9cba82e5f816aee64a8125
SHA256dd4e407c62b82511efaea47fdead9cdf010a8a6cb93f5313c81786aa34787560
SHA5120206c33d044bf5e00708b618734cfee84ee16785a860549e71d9ccb342121835e8a1d74aea5363179ecadcad5e6cfc4fd14f1d81144b858ff43a91fe91e602bd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b