Analysis
-
max time kernel
117s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
eac1b8491b5ea742c3b36d55dd6e465d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eac1b8491b5ea742c3b36d55dd6e465d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac1b8491b5ea742c3b36d55dd6e465d_JaffaCakes118.html
-
Size
11KB
-
MD5
eac1b8491b5ea742c3b36d55dd6e465d
-
SHA1
82683f57cd95498eb0b09808d71e4ae1a81c61c8
-
SHA256
d7d0bd16c5221e0ef6dbdc5443673e7e31a7d137cc5affe1c05122e696d7cfb6
-
SHA512
322442bca37de4e822056337d7e19a7ab52e73241a46d7b90bb9d09a976e7462a737b510d5ba8a079dc7e3c5d2d128a6f82e6c2c74166d5df52f2b7632c76544
-
SSDEEP
192:2VvlIsr03XU8k/w1wvqLkZKByJnH6GKzM01gsw8uBuLbdU8d:svlIcuXc/guKByJnH6GKzM0gsw8guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b69056ab038348d269035f797102f53c531f3f1253ff801d67b5da2422947789000000000e8000000002000020000000653a9bf8b1960981019759ff271590ce462ff81d4c1e04b76f6922ec2dc417b120000000c3a0e9f4df9015c4394a334b8ac1501ad7c0495160fa8c3a739e1960820f90034000000021dfcb8c92334931365c21d48003884bbf76c41789072633e115af5967e5c7fab1514a90fd04ccf0d01a44738f0ce4587ac559e27773778802ab8db4079e8f37 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09A135E1-7650-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d037320e5d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889028" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac1b8491b5ea742c3b36d55dd6e465d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa5d0a490fddeb1fd7f450a18bee974
SHA14b72926dffe1ae4f31c71e850a2c2f483be554c5
SHA2569d57d727634f8a2d70c40e9850c646442a5a7e33cd1c790a37b0c3c28e0a2fc7
SHA5126625e370df0ebecfd1bf5ef4506199866adb237a87a8169559ccdfde1da1a66520f7e6243af1b6cef6925f48462b474ea82d342b568f063cdcb04bfc1c82049e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1023d53068baea1c4c7a1a4c71fd1d
SHA1833434736375e37d5b5bd1f965f082b2a21a6444
SHA25696cb7d3caea15994d35f73463b29c7a03d2eddd8c643ecff96c3879cecbeed85
SHA5121163c89e2dcc4febea9ec2a4aa66e65bd12997f9839aeccedd71589a38ac94a8c5f5dd94bbafd9e22c7cd43a1ccd7da1ebaf49e2456f7edd240b3a135607e472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bb55e1cd3c10bde1475873ac3f2fe6
SHA193da52c29b3103f6c9d295497762154b5d679785
SHA256a8f81a62edc9c7fb359a7194f873c972317d4edaa3838e0e5f32b2acfbc9fd04
SHA512308a2079ed2956ec1bcf9d552277cff82189b7dc992dec32509c0326923f7ded674faaea160d50a1f4846e55b83236c9a3a413a577f7c76fe8ee2bd95bfcb0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5586e1dbdf7de66f0981a26c52c281c1a
SHA1b3deec31856f8e281e7a9305c13d79b979363468
SHA2566b3d0bee86bb0536d82eb62b3cb491570e578da501271994e49dc61dc8699497
SHA512ac14fdef4cb7a8c1b94dcce52e5d7503e656a16777266e7130a1b8a431daf5fc6eeb25b65ab2ae98e61307557fadaf6e88f06fee8ece928ffef8f03928a5ca2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e57cbc565bdaa64a6c89e65c4267f6
SHA149674c74f7583491dd9a740dfb9776ee24fbd763
SHA2565b207b04a55d115583d30dc97e28feafb44ed58da08f296f461b2ae4134c12ff
SHA5120c2983c2208ce19a43dff71e3ab91213cedfb04b0294bb641af3fad10f0878364d4078a2b1863fa5c6d0b25e3fcd80aed02ed3c8b9010d323f4112972ba38806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e505df3feb4eea6220d5a6869431a007
SHA1a687e62d95202bb1437a8b43521a2ce1fa48e36b
SHA2568a5694e5c27c330343c8068c9331802bd7514d64649e089edfaf5c2f79c011ef
SHA5120a9f8395b9423ff28ed73bb2a41208d4e8ef892e3f9c09628059b4133c8a05f9e703641b53ff13d9552fdc6827904550f0915ec88770422230127501b4f5bf01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e451b9cfcb5a61a27193d8531e40679
SHA1dd0131c79a8582a223baf8549c1fb644141956b5
SHA256d3fda6ea044538a2a8906b02fd86558203609998c8f15bb051d7d99aaac8ca10
SHA51224cec9567ff0a611eb8458ebdb67fb1772664bf9997d18a1e9d98e9fed82b93d581ae28ac7b1e71154a85dcc3b155cec156d6ee44d1e834a1e84719e8a70080d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3f7c9e9a5d3d75f1c64a36564d1bff
SHA10e5f830229d1a4ad0dc4244114d23af0d8a387b1
SHA256253fac2b84fecf17ce7096693919e8dd38ff2cf1d996363fa27c1a84ed5407da
SHA512ab8390c0f3d37b138a62cd1c8d2cbb5cfb45998331a42de2c88e3081d88a1da931639b155fa0f58f23bd473203ac5ffab568bf70851015b5c7be2f3cf37ad8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1c9fd68ddbd27cc79c9f42865253a4
SHA1f164109fa1ab27288b6dde1252c5e8edae2399b2
SHA2565fe7439c273bcab1984e9c4ceca410cac78af9c8b38e4ead2c6482b3c273dcc6
SHA5127c678839701c39cad634668c2208ad977783990982be7335da66237cfc49ccec258cc1e189257a9b415ec422171fd3007474c8facca0e3d5b06301eaf195ec54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b262c5255ca067398aa29e3c454158ab
SHA1a9d989927d42e8019acac768ca44c01bc8d48cc5
SHA2568543b94285e05ace33f1f83b8c2dbd5b761e98d8a42a928aa2488c61401834f5
SHA5123d2815402a44106c50075562b1ac2c07ae190a36223811054c812edd68e860d0fa72549a79192dca14b1f602fd4fb94fa7b995207640ce73e1cfc3deaf3aa819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc7e9fbc8cbf47adbb4bc911526b86a
SHA1388995b47be614cd597194277968be612bcf09d8
SHA2568fb7d1fbd4af54e473d32f8b19703fc5a351c31d4bd141615cbc1ae083f6b15c
SHA5125c513920a108e630e4a817c042990db9b62a7931eed2be2925c0ed5fd3da2d191ba27daaf259de5b8d156cfc63101f7f27e61aeee7eafd989de1519f8207d8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e2e9bbccafe6b98b7f42ac6901f6379
SHA18ca3c9c6e110bca7da49bf0c4efab936cee59a94
SHA256068e9525e760d8ba9410b59b9fe68c496a7ec4fa82b9be8c12ae65b5327ab004
SHA512e412dde3d411783c4cfdd5ca84da95d1eeaff0cab26f90377a58cd27c4c50c694cb9a97013ff7ea79b8c0efa2613f5a6032d9888f87af76cf1b0ebe1b7983f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc836ebcf26875652b6723d6f9337997
SHA169795c329f6dede8a2c0ff0af88e86826fd81580
SHA256f1a2c60c3ff13ef2ec0d7a7e28a302264502c551645b4396811dcd494e96db96
SHA512388b159ca5020cc663a30c95cd56c41aca49a28e09feab38a2002862ca39cf693d195ca033c23675a013dfe971d4561b13c0a2bf08c1db59efe180ef7e5fc6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4855a8e071ad0aaeccb754ca5ea0fe9
SHA1914605a2cee577de09ae0138485fe88238aa556a
SHA256884c8f0c5443e70dd6be9e4944df242baede02f148d1ddd4119427e96785a789
SHA512b57ce3761644f544994f161109c6e386b372b5b5752b45ff962198c0dab7084718e6c327afba4b5b9fbeecfd5e5c2234006f2a0e072db0ee1ea58be65d86b50d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56593ac27b6d5e69e6e9126fba7cba2a1
SHA19fd1ccdff3d062cf7c709808c5fecf9b7b5ed1b1
SHA2565a57257cf72f78f7a0b1c2b9e5f9e1580baf5762c270d2ad85360351abf4bc0c
SHA51277a46b2b6dc54250570bcbb91974941c58ae208156dc1107acac3adf77969ead8bb945ea29eb726da6d4a7c2378420fd2bbb748a7e529907ce36dc81a93aebf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fce79d4f5c59617b176bd9ec0394371
SHA17f3a2a15155594ab60689cfbfb34544c549abaa9
SHA25667d1bab63269f26290774772ec9b20fbe3043ca944a7b6d8a66f7acda22a25d1
SHA512b4fc9dbd1d24340faf54f1a1d953670e28e66fbd24266f3f3a8e19ffe8c04b36cd3151618466f746659a691f9648d61c5c2fa859869e3769e23e0193dd1d59e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55431afd42a8c8f14a8a368bad06bb634
SHA1541b2931faf749b86b3b6403bb3d7411deb850b2
SHA256bb7adaa5a8b167d3f9fe6d9a1ccc6dba64f38676c2c63fa340b633edef981f10
SHA512bf1ee2a946502813c3691ce8e8d80fc43e5f93788ae9fb679fdfde08c0af280804e38f3867c6b07b51ccc9a0effe7fe23caa7e4ab5430e32bd197884419b584a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc839c317e0705159eb22e25f330790
SHA17d5675591e6b386c1a662d7af9b86553aa7da31f
SHA2563f41cf9f939893b53de883bfb740f28bfa9017408b577f38d198ae5c54346e89
SHA51292e35725a56ec9fa7ba6e49bb7647425b579a1e33c269c52510a41c4a650e3a6b951e73072cb09b6d548dd057fa9ea8366a54f93ee383a8d585ec115d4653b6a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b