Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
eac191b46af44d9da1a189f05e9890a3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac191b46af44d9da1a189f05e9890a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac191b46af44d9da1a189f05e9890a3_JaffaCakes118.html
-
Size
4KB
-
MD5
eac191b46af44d9da1a189f05e9890a3
-
SHA1
f1f35466bb7214603ecb18a243b61bb7975d5f2e
-
SHA256
5c09d8fc195c2bcf6954db3c2ae7e81368fe2d5ddfa9c751768fdfcb1c132b2e
-
SHA512
b86fb471cb2cc37a053cd7dee2b54fd101ffe227111636161a23b9b27edf6cdf32201c6f115c4a16bd3abe71dbcb490c251c6b8b08ba5f782ec46107d54a43b7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oXNUd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F092F701-764F-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000011fb15be7e52e5f0ba5f2c7bdd681653cf5985b46e5695513e5685bb5412d995000000000e8000000002000020000000cc30a83db8bec10f9e2ba8c99ac8274d81202c198e06d58196c2413d1ef4c5ba2000000015328f510693e5f588475f7cfbf5acce77a287fbd1c2d327dcc75e4d5a68201a40000000837f2eed715fe498b0b02555ef386bdd4cff2afdc206650eb39309c3eac7210a482143c376e8d0516bd4ecfb0f4b83a01cde7f8b971045136d6687a09e3f9219 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10af0fc55c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888985" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 1632 2904 iexplore.exe 30 PID 2904 wrote to memory of 1632 2904 iexplore.exe 30 PID 2904 wrote to memory of 1632 2904 iexplore.exe 30 PID 2904 wrote to memory of 1632 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac191b46af44d9da1a189f05e9890a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5bad927e85a429ceb5da2cf439df56
SHA1cf502076e80d8210742d58e02577eb4bc89ed5c1
SHA256cc22e2a9535db9171b4825bfcfceb2fe5eb3bfc8099f1b4ee9793c4d5d23c014
SHA512239def78e2751bab1c18b93e6254c5e34f00f4021015e549bb5ff827a9486c5e89f03cbf2ae2e886a346be57dfe989da776cef3b9dfc26975ecc268177ed2a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959c235ed778790acfe14ea7b1974a2b
SHA1985b65fa0732c94efbc907e7f4c3e22019c076de
SHA2568355c88e8d76f556eb1b44e01c3cda9b5ae2876271e9f36158a4308b8b3a0692
SHA512c029f1ac9fd4c37e4e8b19612c2dbfbe136f9e664a75a01f36c013eb771d9bec54e4a7621a18f879c928310686d3dca251b9a430e20c5dd763c2f118f68a2747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e5a9b2889b5b735088e9a3553d955c
SHA154f5223194c3e47d6d0e2a242cb59a651679f0e0
SHA256405c80f9b46b786b9ad2159bc58a6720f921b8ce493acf9ecbbf479c1d1f8a63
SHA512a31380172cd20d5171a8f87b4d71aac9fe337a0a702139307a9758d3be885d6b4d06e4c2fb85b0647aceddf562b62feb2830c1ab17af631e2b51974a676cc260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983a2d78579f6968e95d4e8be7b89464
SHA169d802bf2f767a2589af2381462ca11cda00719c
SHA256dc2388877bdf41ce89ef9b32dad5af06816301132923f388438cd437014cf290
SHA5129c313437eea9acfd75ce884649c3474288436f5948e857bcc00e01a80505082b1df773f883be2b04f526eccabac43403aa3f4c572f0a2d9abba7cda03b72ded1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5cff65fb55c6c92ebe6cd53bc266735
SHA157e20599334cd7c89892a9ec4455482eb39d3661
SHA25698a7265ed08011c278315b810c6135ce11383ff7961999068a36f32818072553
SHA512160e6b80c3f32797c2d590835047f28642d468779daee397d18f3ab01c0c4cc2a4350aa3cd6ce4f03146328bc87b551afc0c14a0c528547117b8fe8bda606791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540cd512249477d82b9a3a81115c91ceb
SHA17c19d344c0d25b83a1368ace1e9567eaede3d7d2
SHA2564f0d97b564ab3ef5d3f8c0f21510289c53d2626843f81a838fca39f5f46fc1c4
SHA5129cb383dfc0f110e65399491911d31492f3206049673d1cb57921f518c0459c0e782de34f249a0db23b0fa61a203be6c82a84a4173e4253fb33018fbc64c5cb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcdf6c6c9cb76ee57293a37faa529085
SHA12fac0a9154491bca82565c60613f53e1beca7a14
SHA256c98922b4c109a49dd06ec8f65c0f3bdd962759c361bb81cdd064b359df5c167f
SHA5124188e83b0d12f1ec13891eb5e03adc184007761033ed9847acf03c1e48bd74303a79df4ac711e666d5ea2a2ebdcfcd80dbb9e60150a9275dc5f5679a37d18139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f64515ad13b10f2b26a5187bbb314a42
SHA14a1e681c65f2b32667052d0acc7f8305baa10a09
SHA256b871c88c91383853e6bc5726d70f67a68efe86b41e1004e8bd69afd157aa9eb6
SHA512e5a1c7d4fdee329f3f6c52376d77b0ab0af5c6452e1a1be64bf18ae5decf10fc15178872f5da4b45e2c89bf591dafce23cab68da651ea56f9dcdf3a2e52739e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ba5e21dbe85e9b3875df9544d9a00d
SHA185ef859a0bae3dce1cfdc811aeb7c560f605f69b
SHA256ecfe8c9cd99ceb4a3d559fc03deb37e515ec7b541e56ae3451286f2db1085e1c
SHA51213287ef62df41f9e892a19329feeba1d36f5852be74a8d365e7399a739cc079daa99a900227a82aec48f8f6fc4070d0a96d24c4d42872e060018590bd91188b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fba99c85297e78c5f51030b5074806f
SHA1cad48c347f4f25581fd28ff136adbb210b82212a
SHA256b766701bd33cbedc1fb230cd6dd25451340383e916cd5c0b6c1f7bb6a6945c81
SHA512e83414186e896f602054088b4871276c935899a18cc3a8e5b12a240b168152e416da85ab4eb15f2d80fcc43d7c108b2de8b4b54f912475c5aee6b7eb60b5400a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d498ddd4ccc4de85f0852d0b3b964f
SHA1baed7718afeb8d0032f0df1d7c53d04bf95b6e30
SHA256a4f2c567008043380296053d143764fa859191e7e09ffd00c8e1f94fab30cf54
SHA51264715adb6a502ab962db1f77c01632120861a1022088e826888de4b59a2f095ed5648c9427f28d84511c24f989ce2c0a201b10a1edf7f7698fd1e050796ea13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b5e30a5cc5739716ba0fd6e3797f51b
SHA1fb6fe904879be93d7fc3decc8348d754ff85fe78
SHA2569d14327917a5c088166fbc3436f0fecc5a6cd6091f1a4447e8ec0bbec84a1684
SHA51263bdf8b2913a52863bff077d04373e8545049fd4f9874990abb6c16d67dd922859509aa9ba3e27d76db94055963a73c67b9f3ebcf8b37c587b52a220fef2ad8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e5ff5eac3872905c61052f5d638742
SHA10129f9d1c91c2c82f5dd56016977b75a1e4fd2b4
SHA25632289ad7777c0296f805c9eab92234b773f1e83485315d5d2fc02fbc7ba36431
SHA5122de3852ad349fb77609bc03c0c3a231ee7481dee81250b7da5704ebbad9abf39767eedc6b0a9a8720ef62adfdfc2c76960e1f5134b178b13748aa7c6f26dc14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eca9a22135d176e4b0dcef583404841
SHA19391ddfdec8945f8279bab4bede0a4d57dbc98a5
SHA2568e49f2a13898229f77024be87a7fc6ab437c0203aef53462f813e691cd03f33a
SHA5123b6c162f5e5c229c8c219dc47befda8fcef7109a34168207c23fd86f738e584aa35b52ae0ba065554b458956aa5448c002a3a1f86cb524e81c881de2e23412a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb475e7ec792eaa2d1467400199dbb8
SHA1f96dfc890466009561500bc8b2d5bd9c0fbebb9c
SHA2569a3064d98c5d0d5624c38ad052e62d3f5a7878ba0e7b11c9e2dd2d1c98ed2c5a
SHA512e996cd1406dbd8e53bb79e90b81b137f4189718081c252b82aefb0b478fbd9c7a420c6489218dcfd27bc9619883c0f14f865f8299991468cec4f8f3d66755b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5525f52e45a5ded9bc5a6ba1e51f239c6
SHA1f948524c82ca325db88d0b5a6dc7001181325525
SHA256d6f92946bdb702342997d76ec7296b2491235ae3fe858157d3b3eefe953d34d1
SHA512ce510698bf6173ce30650b9f3d3b958b1c7907c505edc8c034f9518d0e1c9e88d4eac3b77f6a48f8a65936e00cfe170c1dbdee4d0a2cc609a61b81a95f47ec8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53148b19d23d4d6c67342adbf5abcd237
SHA1ed600b95f359d9a71db9af0b83b801ee66534fbb
SHA256f6db92b8cf24cf598df66a2168f4f7d9d2d3fab96164ab01d71799e83c660b9f
SHA512b776962b2e0e6bf219d27b452d0de60480a374ed5e46f61ceb8c9303f7805b863a3fb203bb81b6a193b735c44ed1f4d328746842397f64ed870989e473d3cbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b719cf7e15d98c6bee72dbb5286eb37
SHA1f7053323b6cb2341a6cef308a7d02bc1980cface
SHA2563c3fab7d4587a70b40d4d88b478790cdf45dbb261dbabf480bcb7f8e31bf527f
SHA51258b43db4c4f10b66a056f79a6812129ff2fd7021496a8c30569cb8a75c932f29eccebd78d270715ecf3ee5bab51e40923c8212f9888fd7c625b909899c3242b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f7b1226a388cf0125d466c02483cd6a
SHA1b06225bbe3f2477d115c9e46709c29eb8d664e0e
SHA2566da9c84e552b656ebd9bfd966f8a20d24bf1ff67f5bc56b480a367eb0d04e4db
SHA5125c49bc83dd7fe08820c6b5e1971410403f4c06d0751453052724d091489b44ea810eab28c935eebabdf3fc7618e4f718bd2886c63d4049c7c62f0f6e453533d4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b