Analysis
-
max time kernel
132s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
eac22bdc9497d5ad72490d8878447d9d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac22bdc9497d5ad72490d8878447d9d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac22bdc9497d5ad72490d8878447d9d_JaffaCakes118.html
-
Size
2KB
-
MD5
eac22bdc9497d5ad72490d8878447d9d
-
SHA1
98ddce36350c146068bd52a1bca018396d44b27e
-
SHA256
94519914a18f4e79103f16be1940185c07e99b8719d3b6aab3a9fb3ebd2b69b6
-
SHA512
d7eb7be27c75444d069794a24f69607c9ad45da7983efbdab5fbb1c4a0a114434b31f68712a551748e48435ad912c552994181f57a86772df9ee15bc1ce900e2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000006fb27cd66b8e4fe7e84d837601c97d4e378b2afd14a28506e97730ee20bda4e2000000000e800000000200002000000097aba09b9a718473985efee84b37f73b4f72b2d6a5bd1ae3cda0336687c6f38420000000aa6c44fd3605b22c3defe1fda147d995418b45c096d2633a18a7409e8cd414d7400000000243009cadcc772c3993ba601ec8e28ade96a94fb37b89e759161c9a0509f97e6a97a2b713bf43a4bacf37389ad4321886685519bcfe76ff1921e9d3d10ab19c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ddec045d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30672CC1-7650-11EF-8DAE-C28ADB222BBA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889092" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2688 2756 iexplore.exe 30 PID 2756 wrote to memory of 2688 2756 iexplore.exe 30 PID 2756 wrote to memory of 2688 2756 iexplore.exe 30 PID 2756 wrote to memory of 2688 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac22bdc9497d5ad72490d8878447d9d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56215720e3838cd5166e8d248f6c31984
SHA1e8fe088029c31b1198ed29c46761b63965a67e87
SHA2561b39f2d727c3f78cbb6bb3271120ec5475db4f598d7740afbe874c5d2ac575fa
SHA51219636e3cd2177f008767de1b2d7c9ac90c0d8a6fc85efc723cf3959fc5ad2e259b7dfb051dbdd2e1768125d3f014ab6e4a78ed822656c3887b59d883f1004275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed85bfc6c6e81b53bee12e1a85a70b9
SHA136fad26005292c98d3746f38607fef8641676a51
SHA256e8a5a388f3e8c1a45782d60af75b77779771b96a686a1f9c7dc78290d344aa33
SHA5128d97fbc19043406640b57caf246b2e4593d0b6ea5c4e1bd2313dd1119c26369b927544900397f6e338dcd838ef339671fac6bd3fc05483001b4f0422c0df8ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5124615391ea25f49b795f72202d95a
SHA13ae823c6ee6b671b6dae0c0bfa65cf2f379b392d
SHA2562571962fc536a18035d099ca0ba7f7df234a4be66868f3df79de35997bdd493c
SHA512c32c5b86bcab1c7f3c1e77c6ff71ffff422ff2372de3175474590ad198e5a031db24dfe41e189b93304e79138e36d379c5373fb8d9931cb690856f24d92ed2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da664e4bf6c94fb59c2a242fbb1517ab
SHA1a0a00eedf27a1427b024b6c99fc7682cf5e6c266
SHA256983d9821be09abcfacc49bd515cb679102b7c3ef0e0bb808a58f7f031791984a
SHA5125c3c3dc5989e9b80343da2a2d8578dc2bbdd58cfac760b65f7d50ce49fab46742a2ce38108209fa780bfb7b0eb34441103412df2c96fd7a17954eff98911a00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a065355c843a73df87ade13d585edb1
SHA1f2bffb8120641a2ca5cf11eb77798c7083f7586d
SHA2569f817b34f92a6f7a5c7f50f09bda8916715a73ae3efac08001b94cd03b8d9677
SHA512b6387cf53acb5633341bf243d1f09d3588dc7554e336186373de34b1f23dd9f5752305530c9706d364813e0c2e305a7b1b138be478bcc79a4d74c01e06fdd877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6601fab35c5b52426d27694744bddf2
SHA129f3a6888939dfe92bfd33bbcaea2fa195c538a8
SHA256cd500eaf5e85f427c64555f3ece5579dfb7e39564ce71f59b3a1a80dacffc62d
SHA512c37ae5307b6e357c837cc5ef7979633ee3225a3cc1822338156a90904324bdbad198925285025e0e7085e9c9df9607d0b013e317d9b4ed501658a8a62a60905b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c29e28fbe9df7b03a5715609228b72
SHA1473baaad7fd1a31222c0f2703d3e84537103427d
SHA256247aeb2475efb4e4b5d77cb96df02760ce2af682cae37595b02a908ddb430ac2
SHA512649ff941fcbb5bc2eb0de100cd4afe5513cf07f3a8cd6f07c5b6c22c491e7a3ce3731234df03d58ff2834a3d665c5911bc3717fca34d90fb1744f40218467b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52249b5193262e1aaf0c243e3e36e810d
SHA1d49dd60bb8e13d25e25d8b1f17e8daecdaa0c00d
SHA25683805076ea396358c148d2712a78585520ba5f6369248b41691adadb3c59f10a
SHA512e4dcb9158058d3756fc502eadb97dff5998eaea5607a2685d0d23d240ccefdecc3a6ee8f850a978c7c1934ecde84438b53e2a1fee6635f0511b211ea108a1c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520a2a40bfae758923c5ae3a9fe232e5
SHA130953027c9c7627666706e83f5ba9d88bca2a952
SHA256469f36382ce8a645accfa5972be670a34a37f571fdb01eeb100f253297408d90
SHA51202b005c476bfe112840eb7bedff12978c100d5930486a8393d3be484555e16bd2121960d1749d3e50e03b46071f3f31a8bcd25e197b10709c1c27b464a58a94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc037ebccfac2e44af618c12fb0fe15
SHA1c4dde7ab88b1fd2b1264b00bd6db60dc917ed3af
SHA256aad77178c0690e34855fa6d3504a628e0c610f33e88aac9a8d02271621feed3d
SHA512462772868d6ca2375eef59105c9c79063b364cd3878ec884035dc62539e0da3dedd59328fef9e6f7000fc98e27767467501cc8505cd96c294f1dda2693cc6749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de60ff352d8a6fd064de1eeb2cdd1fbc
SHA196a92a40d10ec846b487aac4a4797f08c23a6ffb
SHA2566537dfbc2f37625a7d0b30743915e3cc84f95ee17850c7146190420d2eb1a090
SHA512a213670246d12a24b3b99ef8d43bf400fbe2c1c2a17095ba90041b13c3cdaa8c869477c582107e9b75c8e5fdf6a76c2016327072e11b063223012909f2d116d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b18c18622ec7294821b7bc005a32415
SHA1465db42dd29baa54252e4020b5c58679ca3169af
SHA25666c478f2c3361780ac108255f4080175facbbfbfc6514bbea1ef1f759ae4ce88
SHA5126f031d235e8825222960aae8429253838fce3a95d7ba6f7e6676ec7784c7f4c12cf2993338712374d21406d69a1422062977fbd45da41a02cef595b50195b427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc31a083ee1eaeb036e48167c86a126
SHA1ce085425ef937683b6f88c3eaee236f20a0bccac
SHA256404d7aeed7fae4c3712929b4b699f125f419d37deb6ee721747f41a606cfe477
SHA51245e018c4c3821dd70f7c505687bdc68700efb637d03c1e1943130739db0fa50b980cc2a7973230fa39cd7f3983b706a307255ad657ac01fe51ec038ba4df45d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8af81f1e3e10d8b6c090cfc419f3ee3
SHA1817357aa6c26b5ddfd645d44310dd021237adb53
SHA256947bd5ad85eb628b264b677ffb587d827b50d64552de8bbd1d3d6028ba02b5a0
SHA512c755b95372c6e794e1e92efa2cc6adcc3f7b433c4e94583a44716a78b26cebdd7ac8e6a6421b2077339a84479abc2d15adccfe6d98452357d547e6c4993e9f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512047fd15e1e80bc5c7c772444b02aac
SHA17e587531a3b50642364a8aa9be0e9b80223f67f1
SHA2568e91027123f49a39371dcb169daff6ede94d0cdf068a1381106156eef49d45d0
SHA512120241aa1ead1a351a7bee0ec214ef381174e0fc4b59604bab8563c2a1da939e30d9122a3f42287c7800367876d82d26bb299504d3baf76374a1b9665420f2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58666595c4ee7cce4e957956ff309baef
SHA1e8e8a4e9acf31b1cc648fba7d1e78316aca04224
SHA25640bf2232fba071a904e4ed4c129823f6660740936b6bc2bd17c947ac2b15ab41
SHA5129280d1b95b766baec709343eeb0fa64512fe83acb650e8955cdf6093bb472873a158df16c2aacee9c0b0d0ad04cce456995754feb25b1e453bc5b1d9186cbea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d82dd67af0455b851890d83c8e6376
SHA129c6975000c79ba735eb22ee59e28386849da21e
SHA256ecd2d49555dff6232e7814399362a5d9ce3f1b4e99b92cc7b691980cc0476c51
SHA51237757db0d89573fd3dcb5ea43039f5f9d4693cb8875bfec1def8221935308c2f8a7ebeb28c6378a31327527205863a644b960839f00b8c4fae93b343b0da2cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94d377c3720024803d4d541a6fbe345
SHA19780c632b3964e91f43e275a244b3eab1fe37182
SHA2566272c83326d0b327e0fdd88d62bd86270229a899adbd49ff2d35949e71a58962
SHA512c10ab9ed0127f5543b5c568ecc80c0493205d3e2dd73c9cb0a070a64b2f77457a2f8328a2bfeb5276723f9c600301b06d3d1d28e03bc9a4c0a6994012919b5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a91bb62ccae25971badd7cae59902492
SHA1b62fd8ab767113dd63d8788741d3e6ec9cbdaf1e
SHA256df9a46c041cf58ac0481d97ba7956ee4dacdd9bed861fe8e7943d905d202303b
SHA512a3673392ab7e10206ca24bc6639835946c9b8b1ceb9b0aa82b10a7b209011451df23a58e475bceecd5514aa73a7f64f620af6a80afffa764356bff915031aeca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b