Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
eac197bdfab5af485f6e032a49ea5cc4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eac197bdfab5af485f6e032a49ea5cc4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac197bdfab5af485f6e032a49ea5cc4_JaffaCakes118.html
-
Size
3KB
-
MD5
eac197bdfab5af485f6e032a49ea5cc4
-
SHA1
ed45fb9bd252214c574efa83e9ca7041a14af21e
-
SHA256
16ca65f8cb4fceb5540675e7ce3d083e7f39c4cf310802ec09f7ca2ce9fe606e
-
SHA512
c57bc0bd710cab1dc8a81b8c73ba9e7d85f9ed8d810bc2d04ef6f6ed2f2a3415d82e27425dc1c9cb75e01c4b33f74f0ed6c6831e525f428929b48043f4511e43
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888990" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0043a7b85c0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3025121-764F-11EF-9112-4E15D54E5731} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000001a15184c064e293b6ebb268c72887ccf7c95047d8be9fae92b25b01ab829a6bb000000000e8000000002000020000000090ecf178e2cb4627ae90f42710402a9be48c076a13f11ea896010cf3409963e2000000083233ec846c458b2b94bb06d8f9107e9c0d22f6fd419f726bc05c8fa73e94faa400000009fa1b92a9228124460b7852b9f624e07b7673522e77557e98f0cb426db9afa022ee805fe7524843d0c186b8b76a6459bc984f6f4309dee7a90d17e66b18b09c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2972 2696 iexplore.exe 30 PID 2696 wrote to memory of 2972 2696 iexplore.exe 30 PID 2696 wrote to memory of 2972 2696 iexplore.exe 30 PID 2696 wrote to memory of 2972 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac197bdfab5af485f6e032a49ea5cc4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955488986a81782617fdc05668707e13
SHA1ba14d5ff3c23abcf6ea06d7fa106e236e65eeb16
SHA2564ba39264175c5e702a28532def297d7f538e1daf6c94016478ed030bff35e88b
SHA5121569afe83f243267ab3d3c844d8169997974c4e03c62d208bcf124d6525dd460389c0e69afcbba5579a33b439eb3383d74661ce304b3a301d0aa27ce16d7b485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b70764dc3e82f8e59934c914f95bf0d
SHA1ee8dae7f8d848de9ae12e654e3d8c933fad7dd4a
SHA2561e9fb628c969bc517f1eb1e0006bd2e59d6dcd1c03262239cf32422436b06e85
SHA512659ffa667abcbf14a71075d5b9f41453c7949e24dbe0c29e1d9074d9ef51a28ae08cd35671342a8438da5b2054feb8144c4e0931b99f36477cb8fcc63e92f027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5923eefe6fc6ae1a1e75433a63345e9
SHA16a11a8ce1fbd6e2dea0a811af1077a5cbcbe534a
SHA256cf3541a989e3645e16e10aa8937886b1bfac3d7f0dcff845528b048a71e3d421
SHA51206581b2f7f62a856642b1976b1bd10daf7b21ab0c899e471460877a23bfca543828dac4ab1a760ed74ca1e957b4dfe9bd4768cfe5bdcc676be6ee362828a8751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56692b8889c5b893dba5aa21c1b42ba
SHA1ead6d2b0f9775fc54992afa68d0197b3e2174312
SHA2564e801602e7531d1023da1a2d4b63f8e8fe75cda630461dbdb7a585e76f7dc3dc
SHA51249f4403c24f83071adb53edf8dee4bacdac2881a5683f649f7599ba6bbdac008ff9146aa54e964fcc76d9137ba39527474f794166ce541eea09a9a18dad0b527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f7e629d4970a5a616a4a5369e3fb57
SHA17d1e095c0ec79951b4e7673db48cd9d2dbeee5ce
SHA2567940a4183391b45fe417d9d32a55f38c4ba9f8ae0cc50631adb063fe7ca13d68
SHA5120113ba10fe4ccb3daee9d007568ed1164442359cb8bae81417cdae1432387834711e4322876bf1257adadb10edfde8dade577b504054387c76548954fca9a88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041968d9a4843346ebb28c55135088fa
SHA145077583607a082cde0bb5715ff298a0ba70af9b
SHA256e1261e3e3467ad90e01339793cb93caf8ed4cc28f49f702175ba20964daae619
SHA5129868070d47c9d64f7c51b923305c2d1da2e4d183704a3b36d42174a46a0869e776569dca66c97daa114e3c0ac2c2e1c4427223edf4b89daa45509b26338b9939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5345024621abfefe9ced2f39da5132372
SHA1c9d7e6a0c41888340a855ceccd50edec6853c618
SHA256e9159f34e2d8a8864f108cf9f84190bab4bbc746099a88f26cfda4fd6527087a
SHA512d31173c831ef36df09a621af635d2751a49f50431e7320ff492fc325663a4d09a9598b4ff6ba7b92046f140b4cbc5a76b21ada81a68b066e629b2dd5bdcaf7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a32242d258e1656663e75840d8318c
SHA18aa372c47414360cb4de39c1de3a8e11ee9c8cea
SHA2569cef99571357db80e7993d7796ac6c460ed251ff9abc712145d86c561c713086
SHA5126827ff8abf9d16aa634262da2aa8c5a453ac62a5214c90b9a6c70a710cdad4e00474839719528a95f02b15c253d311a2b75a41c830816f1aed39b0db86ad1290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a0b2508ca67439b19ff894a363ed50
SHA19b31e6e9fd46a2d347cf73229037161a4fdcbf11
SHA2566595f77b4b025c91036d11e64ffc5c3587c7e188c8836b2582800c3e3b4af95e
SHA5121750938a0b7305511519fdbe3d296d56d8b0e622aa5cc7d65584eedaa9806d3850a069b32b416047b1e164b2992c14b610683ccdcbbf354df002d457584875d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514945b331ed66d2dfafe2b310f11d8c9
SHA1784db986d9a419e9ac0eead06d0f8d8960d53db2
SHA256988528b591a108550f21b48da171642e6be6e0f5de8b5ff3c45976808ffd935c
SHA512823dd1bb5879c1a01310c5132d50d88eb4155caf27f832b9aeee26a481907b66700df3fa5d85dc47038989f3f4ec37dbc4772c065e775068e153d785c38153ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df6aeb29fa734b566a88e5c2a5e3cb2
SHA17060b2893f82bb2ed1920ca954b83fb41ff5f754
SHA2564b9b9cc6f3b9ed8dd57026bce065eea859ef6db4eed79831664b268287804c89
SHA512d10fd66473b00d9ee3422270d0ed3a853acaa0dd8a627316eb6242c3c462f0d26d0c194950bf61a0e86e4079f31f7f44d72492f7265887d18c0a8dd46a9c5a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3d3fac4cdcebb6bc9c9d2b81bc465f
SHA147242297b9cabc654c3b96050130faac2b622290
SHA25658d669f779579e64de7d667be4d5ceea3f3eff1f1c4fe06fbf1062cc6cd73855
SHA512f2a31c37745b79c3fd2f0d59458bb167c1a2690dfdebaaee00715f922e9fb21edbff0dfc143ea6e87f57494186e798b2cac42942d266bb7bc3099e63a5fd9a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f9fde0a611be4b03fd654a3bdcc174
SHA19dce41e42ce03f30187262ec002ace499faffab6
SHA256c5155f32f1e84f6fc743cf348f48f7b2194192b09da1d7e9ad3a5fcdfcad3903
SHA51232587b94c6e8c36323274b4f04c00057874b3caf3197cc408d07e64c44695aa225b56ab549e009e751410bfd3f9ba4af2281d4b80fec2b04bdcbc57c53b7323b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6128a036879183a6be771034f2e9bfe
SHA19f068efd0cfe0b3a9c7852896812a6aef2c48bba
SHA2562441ed8d3f12a0ebce126017a4c1bf312f8f8398d37ac32a3dcfba493f52f1b0
SHA512f1be3e81422ec9ff6706b3436c204eb3182675bd4dc0b1ec7bc836ff5ecc00011f67423fc8f613384a263b103330c7838f2892e47dbf609a95117c6d32da77c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9bd0fed6a6b994c57b82ae27e1976df
SHA1e9503287af1103b3ff5338de88cb6f07c25a77d3
SHA2563d1b4c812884ad048e40cf1df62baf815b40a1e68dbdc8a259a0ec9c09c5d45b
SHA512c977c6a9d41d6845f4ad59174f3b9f5db1e30c9a32d977ed71fe0d8530d93150a34f040051fb859e0c4498d2863614a4933e1c33865b4503e7246c0c7b67b25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556abebad0424eb868eccb4b62b7a08f0
SHA162eb92f37acc201575271b8f64098358aa0517bf
SHA25674ffb353709f9c36f2493f4a3c912e0b0d307de61167c474107146c3b5f4bf03
SHA512a926efe5c432765aa5b71317bd5fe5a9e497e678e36abd4e873e0bc12e74aa2d2497453bece25a90a9120045bc6e868fa07aa929cb25d4bc267d3f540ab325ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e50fc07cb27b3260ca6a750ff1ac348
SHA17eccc0023c046d2d5af5303a4052d6f68ad50445
SHA2564659370e1444320353f6da5dfa433b80b6357d7d9b6502e8cd6c3a4c979834a8
SHA512ccde49353e4ab054956d6b513c4e1549a9367cb2962318418ee8933919b725506199ce44df55a7ed5cbf01ee2325e2e0b6cb2c204015088dfaa3904fdb3542d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b