Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
eac2e503d0e110bd326932e3a9bbc4ca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac2e503d0e110bd326932e3a9bbc4ca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac2e503d0e110bd326932e3a9bbc4ca_JaffaCakes118.html
-
Size
26KB
-
MD5
eac2e503d0e110bd326932e3a9bbc4ca
-
SHA1
c4e120dc56d5ba311b4d0f205f82defbfe8fd21d
-
SHA256
96b5bc85a4069fc01850ea37cf0f1f17107cd6c61612dfe159285e88c30ac8fc
-
SHA512
802a24b7cac13136ee57d5d37aeaa572ce4510dc6324759b98dbad0aee0881c9a0a58f184d51f0876ff144caeee4ee8b6e657d67d3e435233d6ee28f1f05e2ab
-
SSDEEP
384:4+QfPFd9QZBC7mOdMkoBKfpC5IgSnbmFe7Acz66+4kJvAgo0igATPd:Zcd9QZBC7mOdMktpC5I9nC4wIP0igUPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000004a41902d03ca2fe8e351a5108073f1df291ff0f81717e766536671576c87839c000000000e80000000020000200000007212a97d9b6be95ab60d5ce560b5936a3424022d397af7b8d10dc5c8951da47120000000cdf2a45734ddcd72475abcfe11a5eb4a529a579adbca6e93e6634889bcc74b284000000026b07915139b8ea3df476458b44b497dae92662c08968bbe05d8a2785392ebf5cdb04db1b578e058d666f05d7a8f43bd87bf3a1eebd07b618761cc1ee043aa0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889233" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{846B71F1-7650-11EF-AAC7-FE6EB537C9A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06f6a5b5d0adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2328 1908 iexplore.exe 30 PID 1908 wrote to memory of 2328 1908 iexplore.exe 30 PID 1908 wrote to memory of 2328 1908 iexplore.exe 30 PID 1908 wrote to memory of 2328 1908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac2e503d0e110bd326932e3a9bbc4ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540dd2ec83d5c644ebfdad5c9c21906c1
SHA1093ec70b914b2dd5e30e21d031bb1bc5886f24c2
SHA25696f586e654ef0e63872d48456de9c7fd5e8505ea5a38228dcadc098e4346364b
SHA5129bb2cefd39069309bec512c33989281249f23276bf8fa687312911ed94873f376500a25b3564e6a1c9f3eca6b27fc27addf93358159f4c010b3e29c5337d1699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0df956a085764ee6b0996fd4ff1b15
SHA10a98fa7a1e23f9c6e125ddd9d4b1ab88639e7eed
SHA256eaeb4c442d7199e6ce8af9044536242b7455b445b8094b63acca1acf3788ffb8
SHA512ffa084da5f5bb4ceee0e25552f640b034119dbd928aee55adc1d68016cdd8f138cd4f397b2e3c28072804fba2732a1a4d3d1c55a5c22cb57d31850e81da4f234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56019639e4f91d6945e3e9f96e29519d3
SHA121dde0c12fce5dd286acc616b443b7646db11a5d
SHA256c627f03f63aa217119c92e8713eda009d2435fb55fbd22ef7363699e5def166f
SHA51262103c9a9bf0d1933578c5f9232a639b0d0980fce4e3135e6233eb085a77e8f16eee10340592605c50ead5e5d3cda86fc56374d661df1c25f8dce3fc7b6c0beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ccd3bbac63e2b8d7cc4310d26815d5f
SHA1d3dd5e0fca7a82711d08fbf263edf971261991c3
SHA25650d847636bc2aa942bda81042bf28d1e9ebf17837e8c7286fc8f4a6137af8feb
SHA512558bec04b54fbef3d9cf41e92f884e380d1aa6996a53013575ae04f38e3d72026f4694b0c3bc6fd021088eaca07c2e4263109161ccb993658444889e71230cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c923d137af2507123c05627560eca766
SHA1baa6fdc3990e2e6ce8e5a679a1f04dc61da6a2c7
SHA256d86b8a2c0c2b61a490f7e6659738b7c2439a99c7b7615b0aa10553a4422f96f4
SHA512ad599e804bbb7feed831f709b63a901d4f9c1cd460fd0806575a6b2fb142a2e6ea4dfd42699dcf7d8bfcacce93fae6c3adf099de951bfd9f0883828e0ab7b294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024899e76bf776c605afaa5244af3bf5
SHA13a1d679c1cfa88679710a3b2b354da57c2e533fa
SHA256a83a9ce459adf83c9c500779fd40f4c1609472319a37f41dda9e0adeb7347347
SHA5129f88caf4158ff08838bb0e740b8b7234bd21167c256ad5d036b9442d9f88e5ce1563b7ccf41f2bcb206454adb8955702f8c681af6932287c8f068b38661d053f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43c533e7b3e9bf79cc6082733d2d64b
SHA1b8e25f8846308353675f91f46574fa3738fffe48
SHA256ec389acef0a28675522a324c1e90ef805e66e40400624a79353d1056fbb34e16
SHA512b4955952ce4bd9f459deee93fd834d967462ff7f2dc17fba6ba937848d94d57f9b387220780671511689012631804fca0b16293634892bd558d46bf980a49937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b89168be8117f4215b770a381b1a6672
SHA1c7411b54fa4afeb33971bd3b40874f10c8a87ec4
SHA256a0d610a3fc31fc7e78f77573b9959696dbb855630fb71bc9b71fcaa2aebe5bd6
SHA5125105f511005c1f141f957573fecc3fcdccb9b4e5997a4c7f0ba58e01bf2b45933678511ca17485f2ff3f8a649953bccd918e2932682f13e0f41c8f23ff7a0b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a28ab1ebf6fb6e80d97f97b5fe1c0ec
SHA1786bb5c9b2b9c503c86b46b873ca08234e2dee29
SHA25655875c518f70f2da69b2f88a5b640fbb4ceb175e6ed8110c4d32435105817010
SHA5129701db662dc3fdc6e627095c51a2edc5555aae681305ea59567ac8bc52c9423469e5d1f919deabc7830fe9fbf040e5a06493ceea85514226e33d5312476236bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310b2068f5637765e7dd978236778f0d
SHA13452c02809f7e68dee244444f98ef08ac50d15e3
SHA2562cddb1bd96721c7d1fdd536b2051f24bc8b339863e35cd0ecb5d76d5d1d503f1
SHA51204ffd3ed1b0e81104e9740c70f4b4d70cd2fb2ce9fbb6a80d576375fafdf734b146f223601f8ea4cfe8ed4b1147c5a3c0588d3a12d7d392d9d7d27fea5999e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa3fbbbf384933322b08ec4a450a09f
SHA1c00186d7da460bc049ebc8d67308899f4039179e
SHA2563258c7355955bbea4650fc61298275920fd8f7c58c0ef14dbac878cfc5a761e2
SHA512483287ed55ed2f5da77ac1cdc0d6973270f48cefc96a8c8d0e618fd73aa8b54b6bef533b15a3489f7a5c616d689fe2c172f86f2d09b04992c74d68cd769027a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3eef9b84ddbffea3ffc7240748ad3a4
SHA1882c07a9f8286c01275803bc89ba61513d5c107f
SHA256a6837eebc6e18e017abbbd354b0914c0322ad4af8156353412cab775f3fdebc9
SHA5125f8ec500c6fcc368fd571a3adfcb25d3039e300dbae2762daa22675c3f3f50526cb161c4715e7f14d720727e8c36901c8ec0ca59e2a1f2e48498e3afb6dbcd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9fa88390c7d31352967614a10d2351
SHA1d2629e54d002532b7886e146009d0f4be3bd9e19
SHA256b98eee0901dbb0005b244eae49691f4d122d49e44ff514f199ecc44d71e11a85
SHA512e2cdb29cc894fb0c4c6831807ab6993102d4dd6908b707e4e10f7321a04b61be4edb5a7297b8e987581a8d1395f948d974784ff5dec43296f16c2bae7b56ec93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524adac8cbf4b222008f43c23fab6aed5
SHA17ef7074ffa7227acad65633984c11e1d5e634d73
SHA256e956d8ddef6fa85ea6d2b929e8bdb06df342f958bee5be42dd532282ee35b076
SHA512b0201abd40bc09812428542937d26674d0cbf86a5c687cbe664eff6af07f1e4aa02648ef922a0e75ade24f15285c03e523502640b10fa3f56056460fe6ebef36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00ca7d8f3c794684298fd3537b85d75
SHA133a25199f71573029771ce981e0135acdb89c8db
SHA2567f3ae54b7b1994c40fa7eccbc16e98f2c566149677e04f276523ab432f50a107
SHA51239ccf6ee6b6afa3de6c71254367fa069406f3641c4c0e3dd438bf2d2390d171ea0602ef5401bdf0d86d52a3155abc3c59747d339b4945bad928d0fb4ea7be09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0f44d138e47a889e101f7ae09b69d4
SHA12938c57ee4564e3a7add6992a0040202b1dfa2bf
SHA256cf00de6e67b5a2e855da3870bba657e0e6fe48cb690a6218c195a257102b1911
SHA512b10663b76b4e6c67fd4ddec8bf53029f96de47b3889da8481cc3de3377025b3f4b3104c78568ae792bf11842e63b460b81e2a968bbdb1e319b2e9f5a8aa06268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f0201292b5b659e5abd55e296d77ba
SHA1dd49c23e6074bbb60dbc2f11bd3e83fcb21002d3
SHA256c6467b492ba46092340e08234a75d04ad2a3507f446a58c1a2be40917af652b4
SHA5120eb7c133d453119df9889bf287c6b5d7ab268d69754a7746c8396e7867ca9d852cae6652961bce9881cdd18c89b45a36f0ae9e7c8021d9382e97d57b4911b1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ea27f38d8b689b352877a03672a96b
SHA1ca6e81c1629aad9ca1fba1dbef705bcc7d7a9c11
SHA256db09c9a24d0be8f319ffdf11905ac2fb18898ccabdb5c544296a20808c1ec2e3
SHA5120e17fdd0ed5e4c52d7fd201e3f12fb53ff3b42133baab0ada3cab1420bd7e0a920c5f6222f2cfac17680181b046d6513c41bf5706c6035ab2e684d6595ead1e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b