Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
eac0d8552b25e27470fc3b0089e849fe_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac0d8552b25e27470fc3b0089e849fe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac0d8552b25e27470fc3b0089e849fe_JaffaCakes118.html
-
Size
61KB
-
MD5
eac0d8552b25e27470fc3b0089e849fe
-
SHA1
ce34e8f0ee0485ec73b762fc95cd9ab7f9203dac
-
SHA256
50981838c105a9d96c43cae4e0fe514c1e0c60b72ae8aefb5bcb09aaf6dd1ac5
-
SHA512
3e056f7fdb223bb6fb3749c4c6123e572baa534545055494e204fe0dcc7ef0196653cb02365ef0b4b5f0d646eab5c23dbacebd272a2a4a94022fba31f0993e96
-
SSDEEP
768:sHd+VbqXIkD3nYiTvJ1AAcZgGT+UfUUfVW/96mUOeRjgH:sHR4kzYiTvJ7GKHDl1wjgH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008068ceea8ec198b9553482bef3e8c65bcea940f7de97f4f1523031ffaf3fb0bd000000000e800000000200002000000040847c096cc12c155852115f65077e7944ac469798153d4b7a9091b7e1ff172620000000be0d8b7e58ce1a255c583079ee8eeb4926d24e41aa1b065784985aa444c5e50840000000a6c5f7a7889f9d1244399c27adb4966a76df3cc9a9a08dd7299f2a31bef8c2cf3b2f06b55e201eac72bd6da03c095cca0e9c81e8b743f94f85c1589b7cdaacdc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3323A11-764F-11EF-9FF1-E28DDE128E91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105768885c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888883" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2380 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2380 2020 iexplore.exe 30 PID 2020 wrote to memory of 2380 2020 iexplore.exe 30 PID 2020 wrote to memory of 2380 2020 iexplore.exe 30 PID 2020 wrote to memory of 2380 2020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac0d8552b25e27470fc3b0089e849fe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1598dc176643aff64e531160645b9d9
SHA1cab6bf1bc51adc273555506174f3cbb0a6cb2d9c
SHA25620ac4ca115bc2ae5cb983649281a0a4317e3e9f7eff4bad896ba3d5e2da06d07
SHA512b578837604c68717837e69dc040566e3f9a9939d3eb92da5dd3ae55b9ee9babd2a33a864c18dbb7d01725631cafff91f13e1a51ae46c38cb6a9bca8a21687327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596c845e1755bdaa47ae4d6f6af8b0280
SHA1a9f812419b234c1bfb3f67039b2a591328bcb01c
SHA256eb7b91cb975afcad1773327dd7b55bc1b85ddd8945655b22edea00a4004d65a8
SHA5121316b2d5bb51608d9921253fdc166a52ac7a375adb30f60fdf991be166bcb50d603ee2bc952e294736775b7e35f8386607259e835332e041eb3d2ef2a7750d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a566d18228e1ef31dfbf7fe2ba765b18
SHA1fa00bc09bef05516f2452e480d42fd69b1f0d1cf
SHA256600c3695f4688c4ca2a45721a358ad9b7ac87b696864306affb7f529919de66c
SHA5122c69d4a48b1f3c26c531df6f2e2f197ef02c2e959726c1d510274e2e987f8c6ecc8b417898bf217ff839185281156da806272812b1f6d3af79622bc39a83434c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef6dbd696aec10b47277f9f76d2c832
SHA111b8c73d232bc23feae837683af4c4cf063f7ead
SHA2562af53dca70f24b7d9ced03796da56803e3d1e34b7c131819cb219a265ee1308c
SHA5121f4400b1e7d0aa0636fd058916e27844fc933dfd0a16d9389e3e0e5d2a37ef6b825c38f3022d7eaa994937b0896c2db50b7819662c56037a0c61bfe4050cf152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d95a541ab88424bf92d34c7799086d1
SHA1b3e589a20e072027bf700ce1ac975533568e29fa
SHA25685c2bf11dc7fe6a69fea682a8eeebdf5f5c1b46e5c5d151bc6a0a18c3089a2e9
SHA5125a894f40f480a992a9ab75ea5efe2086a6dbc1611a7b772e428609e7c9f48436ed4d3a9a969860bdac89e655a6c8d7d7e0dedaa983d7e72e3da98a1e15c5d537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503ae06602e221b80cb108d5465286769
SHA1fdfd55c2d67e98b936eaad5c7724473bdbd50339
SHA256c9b07fa42a7608108373f3b56998150721794a0ed2c4838ebe8e49021fe72061
SHA5129e3369c0623a3d98952e4b75294c6794ccf5a7f13dc78dc10f87b9131c811b22ae6d87bec7486b7b7b4199726dedef4c7dcfe667e4a907f4ebc3d4e52d5b1b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df79bd19d806d340abb12e5b2dd0ed1f
SHA1a8bb2cb0d0f53bcc683bd457753368d8ac446e9a
SHA256d323756154f7201a91d24b681039b3d35750105732579cf0d91cbdc1ecbbc717
SHA512c8b7449831b71e73ad005c8c5dcc817d98b3090361f2e0c8f585d52cb6d2e5c807324c793d26147856364f9f464236d99dde51d9dd8016fcdd55d5efb387b50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7386b959e73d4c25c8f9e5cba3c7f1
SHA19b09e464158ef98fdfbd22356f2d04c9a65e976f
SHA2562b772c5016ad7d4cb52c5a800a1a2b41d9a912af0d8ace7b77e0c496cf19f030
SHA5125df9390135c3ea4ebfdfe7e25dbd14a97f87b2fb87205b5bd6a54e9ac6f156b3e91e11d6a32c5cc0ba9de7675f713b24fd1bde8d7b1dd069d48a7ddf9196cb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c013d29da61cb45982a3e173eafd3c
SHA1481cdbcce499eba31e52069dc290666b87bd604c
SHA2563da17329c45bfa9e91cd8ae9ed6693f9ca3e89448cccb7ce64464225ce4ac6e4
SHA512c459559cd0fa4aef1d396964d53063d938c565facec73ea6c432341d16735120e1c37185a6f2d10b957c251039b59039a644663f8831bad2602ef540dab19475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504aa5e1601b69b1eb310c2cc88ef1bf5
SHA19d8b72c738b8937a9974917d8e549cfa95411174
SHA256d87aca7da88904d2629b404a4cc9fa257718e4737a1c0c27ca0900d563cea227
SHA512d3a2d12781bff7c63e20f02f13b45512e9cc1440a2f77e489faca051658da1d869cec5f98272fa8a6f11168f2dddb14ffe411de82f37e079534fc8c2dae0f83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a5c90831fcb145704141d1bdb74bb5
SHA181b790efc9355981dadd22a9e4055cc06b5c888c
SHA256d19c3fd656bd4d7854dcf9727be1a7960baa1f90a2a526a38333a25f406fbf1a
SHA512597840a366a99ba4f0e06ec3d6f30c8139868425b02f1fb0c0e14792b912bfca88ee66f2619f26fac110e428bb9b749239e14782621131c61a8a77cad96a4a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fdf3208e51d4a0695e8b87287e690e
SHA1804e20e71a1bf2e1d4fc25db93ad22f59f17f64d
SHA256406ba19edf67eb11b4f90b8be753bf2b708615705f1ccf5d9d0bb048fecb9f52
SHA5123b356767f7853f23072152d70754b2ab244bfe87f30a5b1fadf2aa3c31b5332713e6c62fd04886390def6e6b2f5f75594fbb6d193617f4df4c2585d77c681eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e491101fff490999f2d4d988866897e
SHA1c1a23282d5ca8e2b9bcd3c0e7b155a259ae1e09d
SHA256992049b81b7e614a20250a889c507677c541101e74d1bbf75e106fa1a2cc8001
SHA512b7cbc01d8f43e74cf41b47399d5c09d1ddce75a0d9a68f5843c479c6a0cac94e86cc0098956dc3650dee49ad97b04fd248694b22aa05515a0697b48e835db4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e881b8d907831efb8a0c692b075b062b
SHA18b14b5fb7aacdf0714ec6e63aade51448b887b45
SHA256fe64609793d37254f03221cb63830f0ce0f82be3741c5a77b6682d0f98543c64
SHA512dfb2598baf0125c98e1f210ace797efcf9389a24dfd037afb87de932d77977116b0b5d56b58dba5863b76bb8991d4d10bf82acc490ade86818d4cd5775809009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece56386096e6142383c5f560315262c
SHA1f29dd06eddcebc1be5fabe685cb5f1bb66a0ba1e
SHA256bb0fa1a0865d761485f78e172a1e10b08506eaaa25508a24c8f6f35d7af73297
SHA5120426ea8723e6a9e408b827ba6f4b6db7256290a313b25b117afc76043e5fa868ed5d902f98c59fc43a568ee8b7baebacd7aaa0584593db37b052bd3b339bd7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a9ba65f73c0b182fef3d2176ab51a6d
SHA1dd4d2aad74375f741ff568dde1bc2073a95995ff
SHA256a8e4c304266e9a0b7888fe386808005fbdf1a02835af2b5eb22e4864f83337be
SHA512c1437690b67de44032fde003bd1b97303ff32b00c3e51a821b1e5bb94028521e4174a6befaf3e2dac81455da25409d25869d000f31fbe6f576fe35b3ae790052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb42f6573b0be79e3c8b832e6bf2c65
SHA180f97ca0700591998a88fa6a13f4929238830030
SHA2565e35cf6260383b69069100317b01e5d7ad88f9fbc1138e31096d5665ca8e3544
SHA5124d37bbb07966149906d161d63bb72e7d325a97d40237b619fb82a0945d9b7ee9f71636ab2e85fb61a410f6857c9ffe553870f22646ee60e4e6cf1d4e02423936
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b