Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
eac39bef120f3f7a09f54f90c3d0ee75_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac39bef120f3f7a09f54f90c3d0ee75_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eac39bef120f3f7a09f54f90c3d0ee75_JaffaCakes118.html
-
Size
3KB
-
MD5
eac39bef120f3f7a09f54f90c3d0ee75
-
SHA1
d5ebae4225b2b2e9e08c364935fd0f695659b1ac
-
SHA256
821dfc3c2394bdc8fc62806c27746c0d71d8eef97e2ed5cf9b4737b86977f45f
-
SHA512
733205f2546b896eecdfc10df3e4a8502d6961d4150e408c525ba2b5b9bfc732c87c71713b39bc8e344756e1e6900155df54c51c12d3c170dc6f8f6fe7b666f2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CAC0B1B1-7650-11EF-873B-E28DDE128E91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805e8d9f5d0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889352" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000c111ee18b527ce77dec3ffe2df1cc40085b805db3869add07d56012bd04e1c71000000000e8000000002000020000000195b5740c29ea27ad38daada414469f153c5e96903917b91153d51e4396ccdd720000000f497cc7347391f81d1f542e3492f7e496359f4873653ecb597fdea2b3e2dca8240000000f7ee4fd4ccf6576979129cc398372d2cc493c1025fccbcf597721f993232ca6f635b8e7065510992e089ba8bae580be307a447c12b7151a577274d94e84ed53b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac39bef120f3f7a09f54f90c3d0ee75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e98e68e15abf912f7a01b662cc4c771
SHA158d1a1669b577afe9c29658691b823f7d8a734d4
SHA256825e4a32572638d90fff9e50503daba35125926f7e058aae9b1a6f140225948e
SHA51248e67a5333c28f59af12abc82fce5080897688d6cb85a3a99fa0ef6c9be336d215443c5fc64bae87092802745de0b566dc436c4c081d2fd71987f97668baaf0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f6116ecf3c57a638173bd1f1b11e7c
SHA11951d786cab54b3ec2298cbb75b7b63916d8e4b2
SHA256ad312017e4bb9810de0bcea058eb064a18f23dbc069c36465875c88bd875afa3
SHA51299f8365a9f00443a9634945ea9b1d29b2bf330e7aeec1e2bcba348a824ffbaffa0ebb5f829f1b94ef6e14911af05661ced73ffec21eb22ea98961151f5678fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a005fccc72f5674d2020c99176ba693d
SHA1df5c9f739c6caa1f014969614fe58c57675c919a
SHA2560c81134047dd733aeee25f1dae75e5be74823964e92773968b652c784280458e
SHA5122f762256f7c413b1e63ac2445f6da2da1a47adcf4ecc869e046f8894a91abd9acae57a70f59e19282a1b083f0fc50937e08ad37c869f792cef8ff078b7f41e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d3fbd477d52bc5f9734efe929306e6
SHA1ea7261a4c5343a4d89d23dae963b13b2483ebe8f
SHA25627ad7ae3ebff580908572743ddf08b1d6291524f7fc31137a2c4785ea9400b54
SHA5126e7f0003420fdf67db78fc8f11a769b253559cdccc96134f25d51621066e3e9bdab1d88d046da97a7cdf905c34e8bb4f6d771a1aecc3feca9bcc19057a2b56b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3c1554cbfea37a48ee98e8762b426e
SHA1ac6ee253903821655efe8665f5579bdcf493c382
SHA256d2564c7fae84090d2c121daaeeedb5c5f162c51a8e09f9caf64856ba837de01f
SHA512dada01c374572a575f6d12ca0cd10998bcdfdb8c93ad2c1952a3c18bdbe5f7b87628a78bb220a36ae348ab0c56a2df9f01c3c18aee22fb9f567fa7df53bd629e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b3de05704358166baf4174ba5f7dde1
SHA18a0042b0f81f943019f217b93096856e278c2d5e
SHA256dea2d43f0879ddac9bd5b09e819bd47d2e639469b86ec760e86fa1c26f018c78
SHA51219c32881a302ef6d800c04c36a57be9ce3f95a67217cee362d1ee93ff8945bda9f9808d1988db0198098f122803912f8eba6f315c5adb4dd401f66c78ef58b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527dc340fbcdb2c3a5e996938062faa11
SHA1034e1fe2b1ae6863ac92d8fb2e0ca3f24b14ba05
SHA256cf3e79b55f195356f9323709eafe480c386540dd19414b37cdf073e609381ced
SHA512221a66b3067913e2f51eaf11a5dca486b8995cc02715d2c1bb08601dbcfd3f26b8955c31edfca94b6f516e3f0bdbaed4d2fc87624c211a5a7908202fb0986db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6e4437e1cb2b0a4da9abab6dce271d
SHA11fe4476740ed01cc781bd4e94022033864ac6afd
SHA2560ac1b583a27f99df9d072ca558d4c5c413a6837d26f13d6ba8ec7d6d87a5031b
SHA512e9191df47d40e18e541aa15a0a6eb4504761812fd695191418a3085475b5ded8dc754bee1324ef482d90f2f42f54616e90c17a04ed41ff2cff8c5f57da679464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f41ee22caf8172747cc38e37eb2c40
SHA11670914d3c13e07813f4f546420ec1d853d917c6
SHA256b3970f6c8c5a8ad40441d233e52eac185e5e9417b8be87f46878626f917d92a8
SHA51223de29ebe1749292c0eaa6d78f9559868fe33d38e1b9e4c8217814b4fb6c5b028ca6c17c89635904e66bfd11965d77527b552c85ef6d1e17adb98d71d4cea457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550fc6cfef9210a376f4830564c5fb4a
SHA159f124133581f30b697038dde1dd41de402ab380
SHA25656e7d73d8bd349b74e23ad46adc5c99525f47e188c3cb2777bf20a4f1980b34c
SHA51244e124454a68bcd56390f8aecd6bc4808ed8cf57e27ab3c8671e6fd9a5e701c6fdcb2164d2d5d7e398c5735059d1dce559ce366a221f77d8fd2290bb2365bdb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c2ebd28837ec11df01751df5630f8c
SHA1e4efe8b2795b51cd7074bd5e1ae89808bf04f176
SHA25681c45c6a09ed4669b81fa29f3dd45ba6c0ea7b9507f30ec186acbdeb8de37ab9
SHA5124e9636d52a8ea189eb6eb39b82cf92f5df33eb6317a71bb3ec8a36af05755527030fd8eae9d6983f770553fe86483cd54f9a4bda5a1b839e56f6d84fdc6c0c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585aba32a15e79ec72656fb269212a543
SHA1cbec6554c28ed6db40293dc4b76cb0b8b61b0bbf
SHA256d9f86bd3b254bc3dbcb9ce5daa732a52fa593256d049ff9201a1fd77fb738b59
SHA512a7278fa6616e69dee05d6c1589b4e5657d6d60e774f5c58151fc1f5689c831484e668b1737bcb15eb5bd28e2e6d14c474796c7c821e9a055b926145465082603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d16a3528b3391f742a2a12bcc773a475
SHA155ae94b3279e666805f2504ea4bd135754fffa68
SHA256ec210174a44ac65ef38a12c66a7d2b6010958327dacca06c3239a9f7992e9bfd
SHA512837e058229b1a4f3f6b86c5a2892310cd4bef4872c203846ae6580bcc69cc4ef2c94f7e4e2909591db1f19c4be6e068bcafe82cf78184922fa32aa5f468ad81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2629b9efc0f1d7782f0124ac34e99d
SHA15128a041efbfa502e78232f9e499d1db492dbcb6
SHA25621532d75de884aaaea85962907004fdcc98b45f95dc7f4e6a1e4734c84029145
SHA5124ea0401effdc656b163886b7441221f0bab29a1895b4082ec6902e5216bf160c6578cdbb6e26b997f840696810d46d16bc220e8081c019bc1cfae8297459a1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a20ec679a1a4cc2311527a5b82625c6
SHA12eecdf28a2a01c23411b73a5b8ac653a5bf4a581
SHA2564f6f9caa4c97584271a43ec73cd0585556f3020ad7c8fc72756705546251a3b0
SHA512a4dfc5ebd4cab1e233dafd157a6e3cc9bba80e9e381c1b45936abc92a4f92ab3550978b9335ef1b4b441799b62b9b226d2223fd30535916269792135a9deb14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b90a04398c77709151625568543f4d
SHA13ae2be855cc0ab60bc1b10dbc16fc776870e7e60
SHA25605f26e05e70ca9126359293b3cb054648c1077e8fe548830d30181d007081c22
SHA512cc7e93e5a56d3e68d50025a97d0ec678663de4a76e98e7604d19c90dcaddb70d02d84c67c8ba00919cd7bc5cc3d24face5abfd80612f136685070e2b4f66ab92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d647eab69661ae74e7b5cc31f742eda
SHA137cc4df3c4b0c3518a8420cbb4862173e397c12f
SHA256d7735c9ed0c2cd1b87bba2dbea779b17c83a036b8de1041d0b922867b57ad6eb
SHA5125d9583e631f8e3e80104e0e44265a81cd4e8c914c0c59f64f02d85e099f7ae44e70c2a0429598d3bc4743e03a96f8d799f033b885f4c9ef0fac6d35608585efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d29f86e7bbc52ec67b0306299f4917
SHA15240383c9267e554728b3be1af80bc1528637f4d
SHA25685561822048fd5f2a80c6c10365d9f6388bb2b5069a33fe6df6178d4d09b0118
SHA5120771238a2142409afc193d5f37ef9e04e6441af899c4b16be02147f2a9d2a58cc98104acef7458d3b3ccbb2f7659889e621a3399ffa2b1140153bfad772b676f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8dfbecac198e56c1717b485ffb238b3
SHA1fb589cf8acae2ae1c9edf9aa4b373e8e57b7db4a
SHA256b849f0a69c135d78872037e9dc9e6c2fe17169736eca7ae1cde5196fcbb45523
SHA512c82bf5c28022032b06a4bb76450e8aab68ae47aa29c19bfa07456eb529927369b3847b469566246f107265f1678cf085cdba89315fddfb46699755026b88cb16
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b