Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
eac29c25cea9232712f7a82956ffadb1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac29c25cea9232712f7a82956ffadb1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac29c25cea9232712f7a82956ffadb1_JaffaCakes118.html
-
Size
3KB
-
MD5
eac29c25cea9232712f7a82956ffadb1
-
SHA1
d2259745c435801a929bb3867acfab69f37250e6
-
SHA256
8fd03e71f31de9f64dbb08453ad3f95fb549a9a5dd95f0244f514bc4b209d09c
-
SHA512
cd0c816f8d8648393d73bc8470e807a0360714149c061e977fa74bce28a5284f8af86ae9a63b4cab32cc3451043a84e3b90b1f750d1934b686d23c7178c83aec
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04b0f365d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000000fb9e7178cdd6a7c640586f4658d0265a3ce00e762e3f835f544e1fa307cf1f1000000000e8000000002000020000000c4b5a6e70ceff34b1fb79fa8ee50f075c05766d9a5339751ac8ebec1cb066aa020000000a37c1992795b56fcb53e6bf00414ed3de2ef67245542037fdd1c4593d149c1cd40000000f42fabd0b9538804d9f50b4e4eb15a7957d84dfd63375c5a0104962c6d00a66cc63ca381755aa89115ba8921c8e634cc634975a709e821c5b82b9cf25a2874dc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F6D8141-7650-11EF-A059-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2208 2196 iexplore.exe 31 PID 2196 wrote to memory of 2208 2196 iexplore.exe 31 PID 2196 wrote to memory of 2208 2196 iexplore.exe 31 PID 2196 wrote to memory of 2208 2196 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac29c25cea9232712f7a82956ffadb1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe18f71bbe1b341fc4d0b7a7f18f9f14
SHA1a812a31201a31eb359e9674d31ccc7f12280bc19
SHA25699028b861f2b03884bac4df14be685e093384b0af6ae19ca72ccc3dc27bd37f4
SHA512245d7e3b275ef3619272384b82e130d134be43c29dcafc709ff7c7ac4d93c08cc2709e8279c413a52f0a134d64402d3c0d94a462962a654f27866bd0742362e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0dd12d8fc9f389e8e920729a3f502a2
SHA15aeb0199b7c86607bf8ef31eae162de0a46db691
SHA25600a56a1b752df30c77dfa78ea3c8dc397bb518c183c1a96e8ab1401bdfcb73c0
SHA512e3fc52d19eff56af094c20bcdf2c25f9d51d7e519674fd0cabac501e4086083925851bbeeab088aa346775cb7f714baebfb6e2de49523096827277c7d680b728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee529ef0861d61bdfb5eb38cf0a457b2
SHA139efa22c4ddf3076a5f60957917e8e75e879e200
SHA2560ba8cdf8c3bcc0b16f4347e66af88f7bc5b1317660fc5ca09dde9da246a84576
SHA5128c4e1ab592a2e4a59b8527f8f1b8fd7730f169260058ae1f3999d1dc0dacbcd213202826b94fc4e5ba1e7f0843ef9a24f743e777a4f5af4a2f8b96a48afd8696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df7e61d5280c9eab9bdff762e4b8b43
SHA180c4651c0a81612648509ad5999e09bde8919e2b
SHA2564153fd3add34093240c81a8f29fa53e25022258b33e15aaa5ea3e1a34e6f9442
SHA5123abf896934fa641b98e6a9af5c9305ae8853eaf612429ebfff4dd3c09bac91588461094b63c0863c62a842821fcee710f9f1bdcb2ab62b30eaef59cb75bf15e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddaf793d48a6848b0a78452db9cf2443
SHA1e749ac330193a4b53897e8a8e0280635a70c529d
SHA256a0c4e8d0220857c76d8297924a3f8b1908c0131ef9cbc76e5d37ca912215c9f6
SHA512ef3971d14b3fb978abed7f9a6609e9f03fa032388d832850066c0b66c30693084d6213cfe197659360d689db37ab9406ce76b542dd3ffaceb632aebdf806980a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed3edb3fd2d6e5987d4bf05f8f34afa2
SHA143ad0e76ddcdcb803325bd81c48fd1e0110d1e67
SHA2568ec9efd97d5882899a14fa074db408db12c151eaec663fa1005455f7aa0de6ce
SHA512614500bc019fcc6a536a9736946cfb607496b45dc008db64fd9c5caaa6247924c198d619c6eec9da2631df33a24244418c2f47aae78664dbddaf956d73143ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e5f24b32fc632c062645c06c870477
SHA1e66d78cdb45bb52d2fbf7dec6bf2d970d366fb3b
SHA2567290ae40ed90e78c6b416705db3a28164b845b4b51570b9e2d3e42ad43b50ad9
SHA5124485e68191461fb8c9af69d0924d9b006bde6f2fb1ef42ee6871158ecadb9b215304f5404e7102fcd1865ee77c30535bb553c9ed6ce15215840ddf3255cbceb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59969466bf6a040411fd2fe18f25a5ecb
SHA1fcf43c761a8e89cdcca8d2472246317fad6688c1
SHA2566c92fe1a281c87f4711aa8d45277b361408efce860a02b30a75f98be1b46a4ae
SHA5120587e0962eb4e1b72973465bfc2315f3e183925406393b58294e5ed9e615732c3f7ed4a133cc4d112256d79d717dbd5fd670db792707c8dcbf38819fde2ccfc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6856ba770cf15d40ebf6e409f4a144
SHA1222514ef89dae4c956b60f4b796ef9cbeb481870
SHA25676026e9567a6d0bf17f68951d76083ec73dadd321864e7697d95fb4cffe302cd
SHA512bf72e8bbbb4a93cb9a13179678360f7232f62b18a31e25156774a83a6b8cbb048cc9d4f0b09082abce3201f25051400c1b8f4371b605aab534e8b9b495bb4e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541f23875bb744bcd4088e664255dc1c
SHA1e127f4dbbedc9fde5e8361aa432dbfbad73b7f8d
SHA256882a6f2e109d6d7c99da5027e37e38ba415d752c77de8b983ed8d87a1c8d2da2
SHA512d71fff3b53d117a0809f9a4093d0802e5911ce3a14c07e7a408a9bb6a4f5c5ade3f1f1cb85b25a27af97e29c5be5ef218f89b5b52a4565b23888db1cbe63c6c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef5df40a628e96d0cbc577d07b26f74
SHA197271a66cfd4c6f71093a49972708803a1fa86ab
SHA25628e7379728e46ee1bd1c0a13cf2d3d7ec470c447e5981ec2649748e44f576290
SHA512dad6f3a5dc4ec5374de7aac7c78db01c717766914054180f3bef1a431a776fd6ee37210c5bab5caa43211291503c737c43bea055d1422723794337c15cf0952c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574afe817380519cd5252476ba8adc37f
SHA16253c47b33440363b002c3ef331464db759c3a4a
SHA256d650f7935193109edccdbedb77543b68a1cc0f19558f0aadc3b2497c543e1b66
SHA51255cc5def5ef717dd95cbc75c1b6e15ae7772a4a225098bb8fe3df5690183cac7369213df062bc6511e8acb14780b9b641c3404598116691b95a6b9c492b1f8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500882083b00a55e9117c3488d24863b9
SHA19ace84db14b44f6d1018d7612a265867ad1e200a
SHA25613dcab35328b16edf33f1a8e08926f9e46f7b65fa678d63c457e463e4041e55e
SHA5120bff465457ff19d0be770fa650221a933c89c4b37949136dc31cd89c55740356563b1b7762e628233b8e583bd051d9def55d35b381ef369eca4c00421b1ae4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e947d14d3149932be2104ea276425c6f
SHA161dc87ce0b9bc40764061a136b5d44f6ac4cc938
SHA256a3bb0ce83093c52ce85b9a5c3a8b3aea4d7691408b0f9aafeef32787546ffc5e
SHA512147b4cff0079e280be61619f9c07fcea221cddaca0e73bbe72f87e0b024d03481acd118202a2bfce68899c9bcbab5d753bd461596c87a5720bdab7dde707887c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53141f14365fa1bc02e9eeb40ce8e9f19
SHA1098162aa744024d1bfb4ac54eb79fb175b1a8aa1
SHA2562373acabd225fe78b640fd9fb579478534c2096b04e42f2e68252f0ada7c8943
SHA512494e24bcdd3e1ed10aa0b217978c9eb32a99c0ae64baf4e177b974fd2c05ccb3f81f791c1846c4ab44d5e540a21669181ac7094ada5e735ffd66472db6686423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7dabd4cdf2903c946e05c7ac187940f
SHA1a27e48731879535a7b24f87ec1a979d4a0e5a18d
SHA25608f2db8206259a3b29ebf2efc140b1d3d42d8578b6fce81ac714efd4df3c239f
SHA512656f5df45e8ea6aeef2cc589f2941eba2b00090bd14704df4ca94490e074bbe9a318db9b5d8c48151a2a084de86a37baacc5ffc443c1ea224e466ec58c627ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dfd934e4b5911d43b8a7f6dd58ce324
SHA1e01117c166cee5ee97fef62dc7691974eb234baa
SHA25621985e7be947fcea88aa253942f053048a615313d86d0302db7e340dffd1e57d
SHA512f7ce371237028f2e62ea3f7df5c325fad8edc714c731fee9c6aa1231f4c7585c1bd89ae6b54147f9c88ea7fd3292b014c839725f1f3b8795860ddc0d14e1ed2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c72c323591b24da3b5811141b5d086
SHA134d257170484f92ca3f5f5127bc7aa6323a216a0
SHA25663de7bd5d28a772819795af6e209551658beefc6363e7b40ff93b031c692e526
SHA512313f177fc0a20fefcd27dbeb4c94022b73fdefb78dcd18214b80c4524a0b9810dd768025216fb0cee4bd36faebcb2320880bac94cf7209038655013f178f52a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e1887661c266fbbe07eb8d37560b36
SHA19bbd5fc8de499e7c36a1d615d6ca25084052ba24
SHA2563af3154c8a241ec42ee6a7cc6b54340639e3412b9bc0ea8cc4a7b8b15deebc30
SHA5129841f46773b85eed24433e24636cd34cb33fe9c7318444f9153eb00e37c12a0bad0749e44e5dd82c6c5fd577bd9ec174a50db97f4fd1a53fc58129990f77a24d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b