Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
eac0f41b65b85ae70049840cd225f729_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac0f41b65b85ae70049840cd225f729_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac0f41b65b85ae70049840cd225f729_JaffaCakes118.html
-
Size
26KB
-
MD5
eac0f41b65b85ae70049840cd225f729
-
SHA1
c6fe202850fd35748a67ed58497dd5700057a062
-
SHA256
6c0516af4808142230dba8fe9f10eab747b311384794d91322d67e9d80c81059
-
SHA512
69eea807d3decd247b58354a86223fbc2f278c6c91d7c0eb8b28a4b45fef9b73f2c64a18b2add774bc31c1c89def29d9c4a0fcb496594425899dbb731377d7ff
-
SSDEEP
192:uqzzrzb5ndinQjxn5Q/snQiefNn+nQOkEnt8GnQTbntnQbCJVevo7NtCFo+NzQ47:nHQ/qygcdF9C
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE865F91-764F-11EF-808B-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04259975c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c6f2e131ceab8944d30159f77c02c71d771b92ce751beb0cd08269ce6f77c108000000000e8000000002000020000000920fde68f0c90f5b20fed4db3c1d427bd77876ed721d4549ec8842c3d0342f8620000000c0f960bb6ca79ca862c4209b75cabf3703f3ec101c99b69a95db00bddf536d1e400000009309256ffb6016361f973edd6e093d6b40c3761e8388f1f948d66eaee2215d91ee9faf5a2a2596609f35538d4f0589112013208f27f15e01d417017fd19f938b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888901" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1364 iexplore.exe 1364 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1528 1364 iexplore.exe 28 PID 1364 wrote to memory of 1528 1364 iexplore.exe 28 PID 1364 wrote to memory of 1528 1364 iexplore.exe 28 PID 1364 wrote to memory of 1528 1364 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac0f41b65b85ae70049840cd225f729_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7d0b89bbe5b33b6d0a2911987bf39a
SHA1a73522121ac7cea96be2babf291e5c754652b45f
SHA256872f848b195beb0cdb38c158896e575245640a9b00623b633d7562a48abae21c
SHA512c091755c0af8cf5e121159deb832af6313e7f53efa00413eecc5eb05063421750fc8570c8187f0ec0812ecfef7b990be6507b3e2773a3ee9a66d0080853b0e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50059433fa57d957307f34c44901cf4c5
SHA1df605396ed6a809b38ee22ec8932b08c6cc52727
SHA256a6ac48637a46146596ef46d34b427c05ba8a31f7f3bdc4d6671355044d6ab854
SHA512186a9aad638766c8a4f168cca680eb8667d26f3ac84d7e1adfe1c08f89a34f99726e429e12b151370dc936e6dda9938263ae48a88a32a2d1dc2abcec45ed4c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcb6c866ea0afdb818529068505f6a31
SHA1dd5f6ad7688f6efd74a21cb1c7b9d552b992a258
SHA256b2f8e23c1b87ed6142513f9fda75c20552d2ac3670317048831460f2d8850e70
SHA5120f7cf8bedaab5b53d12dd323d6534f3f2a36820e2f3bf889bc2688965ffa7ba832d316cf9758b365cb7fec6ccb9a683bec2d5e094886e40afcc07d6d14bfa277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b196521100f3f10cf7913ef99ff0cb02
SHA1a3a2b63c32641ef6efce765ccf71408308e7033f
SHA256c5477d06d576bc92e2ac16a1d48fb4e4d64a20ec785abf0706878f009accb76c
SHA51265d7fa216857b8290d0c4b7674884a71a1a08fa7c51763f8637ba6099727cc038652d5454439a32ef5948167e8d63d2648b32300ccb99cb56ab5c88eeb5d6c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5fd2cc133d33de678959295dd9739b
SHA1d010b9e564cffdf8967605461afa05ceb196219e
SHA25642a8c678b2e625695f597d6462b41e0fd7edb39229ed50edd674358eccdeb44c
SHA5120bfc0582c6f4a59b66fa400dc6d0a5597749f276944904933ec3a37e658a6ed5570971546dc0211a93a07dd518099893852da549fdfb57345f4a663737bba3bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d32b33733f4edcd537f6726d85157e97
SHA1caf4cde07df64cc4f0cf7c8e057f36b276b37e8e
SHA256326f4360a303a6b2ca08be595fb0f394170305736f3818a49eb06f3d5d8aea51
SHA5123973aead8cb2f078f04693cf73b5193e5aa7224460bfd25a8ed6199d41cdcf76cdad76a641fb0dda247877d80830b8c11b5710158459502d41e91ffa93d1e947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b231174dee96b85ef05794b26342e4
SHA18caa0bc9541a362583be004af4011600a20c2c3b
SHA256e764c8a29e97b37fe3988f81393948bf6763440c2c75a0271b9612097f3db9fa
SHA5123dbe94e9b70450f9fa9187e2a90d9dbe6e96e15b7758196b4b8e53c869f27b7d707494c123f02ca9c04aa5d5248e95147595fb028fe114e8168842c4789b2d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8d6e559a8120fb488c6551bb75fb62
SHA13bf7539a5b4d4f21c981e3937eb3c596d4e9de63
SHA25657b68e06a5f8928a5ebf895787b425f280a8e61d518046d076a14d90351dc054
SHA512385b01b3d3410b204e608ae7c9652b557843ba951254f23334ce405f37b7709a89c827580629a012a6c7c92b95892334cf843f2dd99c06e145fec2c992e65777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a452359790926cedecc5dde775487887
SHA1c5e6353dab518f418404b7103ba34979fa7dab45
SHA256fda8438d61973115f48e2e5347bcd159bf4f87679e44dd2d896fddaa4d80b233
SHA51255f47fade278b506cdc8a22dc3314220a9ca5572e0b1d2953a0b08090f2014e0dcf85f3301ab3b68a4f394e57b4a2c23f9258716e28d463a8e62f705ecb32611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d97c43d56c4b4d9bca728ba4ddcd4cd8
SHA1bba7a3bc613a76b8e4c1c8bc077a9ac13e1d33f4
SHA2565ea565428c6fb49c78eb184a9b80dd824a0b06a611707b072053263bc1af6b05
SHA512d44ac00c8141e5102be19b71fcec26734416ec8dc4819c5e779110e9d86c009717f38b05bfb14133d742e08fa5ff704a048d1ba361808524c30993de05a82fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3dbb4f5924ca61cbc68b23ea958303f
SHA1d37ed20794021c48103b4910be11c70f9f6f78e0
SHA256711767a1e9ec96a9ade4560a216994724314506c13447f958a469eb03c98f657
SHA512f36ed06f14278749ed1e7b2334bb7970be68e44177993a1254f9bbd48e64e51d9c9e1ab165d3a1466fa23a6481e35e3136ea0f6fb646116adb86b3d2420467dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599426d9bb7e9a32fac64b9ba4335eda8
SHA10e9f7a0b703d69a8b1a0eb483fde6f9a750a541e
SHA2561da7dd9fbb7e8e2f7e22a3bd638dce9ccb989b8ea54ae1a010409f848f55d9ad
SHA51228c51c32161ba89a4cbe0130d5fad67ea20bacd5ac988e9b84e9bf145619fd43523769b9531ec5850c97e2e5760bda3323deec34a521b8cfe9179dd257cb7c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b3ec45212f054a8e0826eeb258f74e
SHA14993b8e9538ac6c650d2616aba3cbea0f280a103
SHA25668741e612a1d623325823961bb171ba172142b41edde75f91806dd71a0aafe73
SHA51236f44206f03d34be07cad8f8b7b8d019f3c2103d7a722a5f1e7cccf4050cb70dca30bd7320b1c7ff844a77a5715c9b197009d6b73c655254bbae4023408872e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a293bfa5b53df12ef7ce66aac131cc2
SHA168016673478dfca5ee8a98cc289fab0ef1d2b2ac
SHA2563a763efd31c6c0c04f805b8b57f42a696881e5530c229aafb6c3f45332f315cd
SHA512ab19c834a172abd265365994341bb522e9508846e2fb9ab96247b797f6ee1b4a618f19975ca2022c8852990c9ee44982e33a5acd023c11ecee0a1c7b4d99b535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc98d0f8cd94d4303ac2a49a399158b
SHA1c634d618d35e732d3d3ea794517e8514e82e845d
SHA2569f9c98f05728fc7b7da871db0f8b3de4b85af028b2cb003c448a22f134cd631b
SHA5128e970c25ef40e0b7811b0a82ee4bac23fc842f918385f02f4fb39caa98f65ceb49a3ce28e3378a83fc74825358d683975f1f7954d498b3e96f508698952baaf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59230144259a9af84bc3692dd42bbdbf7
SHA1ef47fc828d241ea55cfd8e3af81150dbcff700e8
SHA256b668f3924c454dda535dedfca3c273d1521829303464817ce3d5c75c720f62f8
SHA5121f934bcc9dd42b471f4782b847f5aa10c0b33edb6b9bceb284e493f6b11b54cb1b2415be502ab050b2f81f03992780d841bb2c54fc07e2e1d18453d0ac8acc88
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b