Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
eac318ec7bc9cb095658eba910638997_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac318ec7bc9cb095658eba910638997_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac318ec7bc9cb095658eba910638997_JaffaCakes118.html
-
Size
26KB
-
MD5
eac318ec7bc9cb095658eba910638997
-
SHA1
49225732643ec4f52a3cbd97b3c2f11a4855fc9b
-
SHA256
1ca78287d75f22a9aa06dc71a6b9eb85cf7048d9fe7dd8a97cbfde68bf0368a8
-
SHA512
dfc210665d14401f9f5b84e5f1cf9f0cac0e37fa0a4cb4266c068bd1103c7f06f8993b62e5bcf897a098f94082bdd062e2ed3a81c862ec7736cd37d70126c533
-
SSDEEP
768:S61lpAucoSdejlPEbZibGUF1TB/g/ZzD+PYaUeaG:SYI+SdejtuZibGUF1TB/g/ZzD+IG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e02703835d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889259" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000006385820aceb39d0b90f74540f2f5f5372a4092c9285cef0ef46feeb862bb7cc8000000000e8000000002000020000000c3ba6bcae854724bafd9e87ebd303f7b40af052aabb338922d2510e6a31790042000000071508d289615b8b479cf7398f3b3bc8598b156941205edda0ddbb8fb848bd98540000000b3ec4018ea4fff2f388186f12e6d5e660cb0f13798e8118c01f487f8f022a1689f78de320d4a752fd891b3c4d555724c7d02afd08d866fffbabcd483c1c77e36 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9356A8B1-7650-11EF-AE26-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE 1804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1804 2272 iexplore.exe 30 PID 2272 wrote to memory of 1804 2272 iexplore.exe 30 PID 2272 wrote to memory of 1804 2272 iexplore.exe 30 PID 2272 wrote to memory of 1804 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac318ec7bc9cb095658eba910638997_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c40ccb287cceacaa3a947baadc8875
SHA152c8dc75c194cf62341f9c01210e14a6087329e0
SHA2566d38cff98e11b1e9baead7d8de5b450c8cdc77b16b1c4a4cfe97000cbd3c1d4b
SHA512175a57b23ac00bec2bed49d7b9e14c31233c147e6bacf5dfb5bf906ae9c174b53d9a9b12f2e74e3b459247fcaac78cd7c6b962f06e0b8aae8416c5551da9d520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4c205d893eb1ecdc5114d1a310ccfd
SHA1a692601f7a937f821e671743682bda98936a21d5
SHA256606f44db325ad04e85e7a4ddc23d7ec8fff1ac34b9efff9b952f044217acf05e
SHA51276179924891bc866f4fb3b79c3f59e46df503138add2ab7ecfe1c5173bc2d3fc6d66b47cf38711be4116f6fe211c8bbc335f52892dad55713a07967b7d527484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fae7a5b38a39a9905bfaec60f85ea131
SHA1d23754a5304699c8ece7f392cc9d7925e4ad6219
SHA25658ca19b5c6b587fc975d4713f4427afb1792029ced75707a1249e112c57a2f50
SHA5127d6512409bdf3936433ee5d2a0ef774423a3ec8787ea8ca7dcd9cc11a073cc5bd4067833513d94969429c31bfe7f7872957f374ace67553740b82ce471e2486d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f99284825fd3070c9b99920b38b5977
SHA12c7ceedee3eebaa89ccc474cbd1906a69119297b
SHA2562675b66ae85c65251bf375295976f35e4db9a5d0f77a95e88c2d809206ee44dd
SHA51211d521076f5b939212686894e6fd88c37af319b047a76dd5956ca895ed20cb00b0601e2695da173993a26549d3b1e578a7de78fcb13b1d31ee34acea7e43f92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec40c8dea4331caae34380c7f608bcb3
SHA1b9ae15580e0bf3b670b383a2c7c02af19a3f26a5
SHA2561ae9d707ac7e24c8b00303fe13e3df4cf3c1d30abd4b72acd7463e8166834a5e
SHA5122e2b8690b8f0850308e1f394939a38507545c1e854f24d9044bdcc29d1457fda683fc86eea932724abd286eb532ec7fe9e62fcd47a71952fc20db965f2188207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b15a33b5b44bd7975ee317101d53e5a
SHA180027272ab4c2fd5e384c5c5b5ebf59c0ee85302
SHA256f14dcf8ee32470ba5b517f6b6134d785a79b85076b2e882da538595698860fd8
SHA5128921c84c5e456e08dba788c1832ce4149f84a418fb377129503acc945a00528db6784ffe51ad1e0107ea8d6b092bf219be9607ca72d99f4f53b5146c9ca57745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3740553257a9912e291e74b9993c9d1
SHA1b003f9ded71770701e1b28a227bd808dca02fb40
SHA2568be874eb082837facd4bf8b0497ec2fa67660293dac085ba79e6e7dee43dfe0f
SHA5124916f2b2503b161b3df0c9717ddc6156b345f65d0691db5b5958a3fb25bd8b6632ef5630eec18afbc9a8889124758c39b481a79042b863bb2200b4466724619b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee370c7c1774d0f3921fc0ed419bf965
SHA1772ad0c6f9e8270d0da934d552115cdd194442e2
SHA2561ef2831cf8b002c6d2073339c9ba28a5286d0cd8cfea02c5ddd786746ec3e458
SHA512d868906727180127ae3653a5783daa5811f436e8441d394f44be631c3056ddb962721c7e1e66811a984efa977cc0a23a63caea91be196fe65f18f9ffa066ebf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56faec93f67cf63a524c1f27651fff2ae
SHA18a298e63373478f805c93f9fe2356e43c1203ad8
SHA256b9b9d43b7f7f252162053b309e17305c57d0990af429f18d73d08ffc4e024e92
SHA512c9ee27d315d77b078c9ebea9ecd873cf6ef7353b3f9447496bf9107cf09c30197d044858d4f14c414cd50e5a4e0063b419ac6ed1bffaf16b6930ed95f5e7224e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed0db270f15b885f7de03be1b7b1b7c
SHA1e067d325452a690771b41750df7951a2516eb9ed
SHA2564a6de0ac348670f9660bcecd34477af6829b297f0fa2757ab5a6ab77ca28d411
SHA512ba0dabe52d38282589a23ca12050f4729a45168233ba3a2a249e62814f9d00b524c6be0beb5f1e31d29e20391ec218c16ea272c90131470c1293fdda50e81e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da92a63d0f495abd6ce7244af6abe803
SHA1d01695d4f1b37aaf1d26809a6f6b74335ae33519
SHA2561746b6f8246d2757cf63b23b5cbd45bd2e4012433b84911e44b923915f2ff883
SHA512f41d64f9848b3bb7402b897ed2b0ed80219d97ce35acacbd8e5459f8e922a52bd6a0fb5bee4c0b6a482f929e1dfeec2b7945939ae6ec63bca6905aab5e4fbf9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545bfdb4a2133ca0f2c3b6e68a5c8cc43
SHA1c3a8cb3bbe8564fd135b55feafcae3b949580440
SHA256ce106cb15c29461d84a6b3837fcf9ae4a4e8146e4976b3a07108cb58bdb70d9b
SHA5120752e71232bb1b6963f83b5a490510c5bb00da65468195fc5eff155aa7d206d7da710457b05ea70d60892a683460d16e4ac9732810bdaf4a6ee885b3d6b791e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b083103118a43c668ae4b33282e9913b
SHA17df60d1b20b93f201748b04b0d48f3e8cccd6ade
SHA256ce659c3d67c4ce8a526bf4f3d26f4017640b56c4a876a07b12aa15393c7898d4
SHA51261e2224221fb7b3809fe4c5002bd239f0c901776d9b51d18306c83540b9bfba3875a5cb3b292cf8b2e568f98c3718c8f02a882b5abaa7aad807edfda9904c739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535bb86ad74a53e74f98c296b3ed0d77d
SHA1a70b74772dc4150d04aa12c11c94c7647db30b47
SHA256dc395bfb143b1d6918a175ac084a4d1f772054eed9258b97d7279a36b22388dc
SHA5122448072fc549ad3172eb62fe11498454286aec0c6b6ea293fb2d02787937348f5583aa449c0a277592a7eda0fdf051c5f7e17011052a7c23c24d0740b63e8b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5191e63cd8bfb6ce3f0c9d68054449617
SHA127d663d7907f72b976abe3d32587986d5a123179
SHA256da9b32c340b0be3b9438a73aecda66a660b14e11e9664e0b8f55e69cce7b4967
SHA512da71b904ced4a78c38274a06e77c8570cda896ab2d305e10adde29c7decd3f61522593f1b11b9084ae69461ce39675cc54e7c2f3fd7c465653727260b4207c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d085b645fc49e173e9af3eb2342bfa
SHA15e0c10160a31ee8c19410dec03eb66fefb2762fb
SHA25609b673633afd53044b30c3a3e9aad52a00d20c3b09e343ab7dd9e812165e1a64
SHA512c5403b2c4f7959590e9cb83c6f83a654e419f8b542010ebdb46431448fe40421a61261fdc304144db8b2f1fdf27ed317ddb35c29cbec9a9a9fba3b1353adc728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d601e5cd93b38b1fd7f929511eefb53d
SHA106edee534a323c626d11902fdf6c381aac25544f
SHA256dd10ef8a897eb3dd28ef93b59b4c13e5072d7b62f62cba5f57105885c331b002
SHA5122e27556373b09f64fbccbed99e163c86b47d9d8765666485125eaf9495597695bc4716300017c771ccaa0cbed1d9b846b52292592eaf8753dc538078d0265fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e121148a390f942de65e0f21d4c60398
SHA12995202ee3f70aea0306d8afc8ca00c69fff7514
SHA25612c98033942131f8c2130cc5eacb440bcedf5663dc9964cdb0b2affcb8b3f451
SHA512bc2d29b569fc3cb030102a5e2ec0bd6167530a017000d7c8975759c8c9f78007d7f33c172a162ff42f3980c33f5180bb95c6f95f8d4a9f78141dc598690652ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177f4502d33cf4c0085ee9b467a570d3
SHA1a6d55e8ffdaa1ed771bbaafd64226baf0b2fd8a5
SHA256cd9fb0c6b0c46dd425dae2b07208b9baac1252a610658ecf5b4e57c77267116f
SHA5121e9e998ce9b16c6a2f4905d508c617d3146c453f3fcd2c2c4d50711d013f13c73182047aa830b943b7c9d7a434b742151fa0967e01aeb6b6df70bcacff754d60
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b