Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:30
Static task
static1
Behavioral task
behavioral1
Sample
eac353006bf874a3a4b703647b079252_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac353006bf874a3a4b703647b079252_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac353006bf874a3a4b703647b079252_JaffaCakes118.html
-
Size
13KB
-
MD5
eac353006bf874a3a4b703647b079252
-
SHA1
91b1361be8a492d3500fb44bd5e1797a0b32a5ed
-
SHA256
2289a648a6309444e2b32594da2e19ec378dd6a2161049ab9194cae9cdcbb208
-
SHA512
b085661b47727de313b06efa2e6f4a5465e9f3b66370502eca8368cf58b8439e16b4718188dfbda0cbe1fc31d428e260863b3d4ffef70b24ee5216fdc09e5038
-
SSDEEP
192:CyiLO1AX0EkhzdjbXzd+b4vud+bJwQFCVCf733y1wNMQ2V8cZNiyd+bWd+bwXPKP:CyiLO5j/5aQFAi7ny1wNMQ2mkNiUKP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889303" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01ac8825d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000079adb3e6ef6df9eddee9a54c0ccd9eaa03a2bc53d7e0fce8d4b981dec7522197000000000e800000000200002000000056bd108773d626a80f686e0521b6f061a082194cf5a3a7107c303421915d2c0120000000adec94c2a53816740fa96071923ecbca11565fc2d1d874eda617284ea548263d400000000bbaf427c094d06178861d8089cc406ec73f8d654856ff6bbf43bb775a2612182285596c383283907dab6902b3cb4ce2df392f05bde8f33b065bd98a3368d201 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE1E6ED1-7650-11EF-9CBD-4625F4E6DDF6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2708 2660 iexplore.exe 30 PID 2660 wrote to memory of 2708 2660 iexplore.exe 30 PID 2660 wrote to memory of 2708 2660 iexplore.exe 30 PID 2660 wrote to memory of 2708 2660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac353006bf874a3a4b703647b079252_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578721f2e11cb34137f98649d80141d6d
SHA1604cb4c0fc353b17df2d163786a5fa662f12a0ec
SHA2563bd49431d7b664472246c21135ff07729204a9199cb159ec4e373a4aaf2fe4ca
SHA512ebba9c962084f7c2ad51ce866485c2691e15eef43d1e4a50a041fb2a39cfb9eaca051dbae395917c1dfb5a1d141306ec085a85bb0f2975dce4e2ef8a353e2ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583fce4d204bcdfcc9afe29299dbb5326
SHA1b5f91ffb1c88fb684750b4d01cdbe62a141a4601
SHA2563dbb8f997e6dffa1057d4b54577bfb1f27e97e02bb3e5a1d22a9438a6d08323b
SHA51242f5d98370959319c15ec2b41fac0e418963632113bd81b69320b9df69c3ef8dd7f6a1620c33672abd80b6036300fd8c195915356745fecfe7ed91c90e4a81df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d95f59d569b62d6d81f8490bfacf41f
SHA138ee8d38a37c078f3a53f6efcc42605370cf9a88
SHA256495c378f04275c7274952038bb88993148b5f0ec75844981991f565dc625c1ae
SHA51217082ba7615ee933d78b1f8c097a3158b6817e5307bcfbe770c08abafa696ebfeb0ac236d320cbba051d8b64f4467436d7513e0da76be953e65084a5f759c712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54922e0c9c8ffaa81c1f2ac995ff2d177
SHA1d5846ed07c882370cfd4ddc55428cb90d8b66520
SHA2568999338af1cf087abceaac57d970313f8b8f6bd37cbaeab417895ef9e01ceb12
SHA5124ebae7ebbd402bae81a79c730a51c99bb2867812667dbcb0221d3151543ee328c127ff10fe12fd52b7bc640d2b625cac95184f3ff74a00d13dd69d81dfa6e51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542f437a34b96b2b174e71a019af70ce9
SHA1546a66c320b0073f945a6a0a6229096c6c937549
SHA2565a9b1b2ad0a5132d01a272e760365d97b49ea4d8e0d09fc8425c4e0bd707b280
SHA512cc7ebbbcb24ca72e7950f0b38a3c8314826e7fdab8930b9e4832d7b6d4c458163319c59e61b220d97e2903ccd1cf58421c4d8ec4a4536d59dfc8ec8654152539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59069fc15d70719d3c1dcc39217fc3905
SHA1221bf4f0839f1671f1e4713997f32552eac95e81
SHA2568249dec60db299a92a6473105f32a0b6e308903ded5eadfb90a7079f8715ed38
SHA5122f5a469910eb4132c91b36ef0854f83c4405156dfcc240d6938a4d1473c87516c998871f4f7ffe06d1b2d1f25a0042801247182aa5a0b96e3698d6090d229b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056783cc94af305b502bd650a5c10594
SHA1f5777480cb30d5997145d0acaa135f9c8a829f1b
SHA256efa7ba2471cbfdd3b4ebb2d766b845daa75b262eefdb459069c81d4918bda20d
SHA512c395d2912a19f3f2601f8226e9b0e688a32a9525a6cc56f353c90d6402b95a82dc480e1157f831c837991195042118d7d40815b0610f75b7a7324007e423e76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3589e97c40bd68418054a8aa45f262e
SHA15858e169243778972d7b1095766e3d6dc8f75a7d
SHA2560be66d3027e58a9af697594f2acc1f49e8f0559c088786bfcb093e66c4d5915c
SHA512a741a5afc33585e3d71c99d1db40e730eacab76ad8f3c61606d45e9f67b4d9574ab53b1f8d8e976f7e449e40ece8b3748a707134085e1c8ce56d2b0a4d81cf3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c85b69ebb070e44bbb16fb8f58a449
SHA1617565fe8a321fc3ccecf737a6e099c2a4c7197b
SHA2567884812e2916c744e344ed94561e4ea31b873ab60fd3db63c3666770a8b24992
SHA512442ab6abf66a27eb869ac93238565269cf431990f56e88e1f56cf27e4a70ad5efae4520259b83a828a4b033a70101ce9e3c8bf61223252bdf215ad08b7966615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b01004a78fafe12e8b920c9246790ba
SHA14dba8ba52d366455f052952c4d6d1d9220332c16
SHA2562270ab29ba6da4a21118faad09cd9f0c35448c88b5b609e7c6461e07c90a7064
SHA5123819c18947a86194a4921ed6704deafb7241e5beab2eaa153dacfd8fc112f2a6255a2829cbeab27959c63518219c21770e16bf7c6241baa0b75f268ae6d281b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298f96987492b70b06fce3bb53ba680b
SHA151dd39dfb50538befdb1f0c0a1579379ace4a778
SHA2563c4f01d0e3ce195658333a981af4ff325cb21a019b5885d87defc06e0c43a55a
SHA512cc0eee65b084511f87b81f04facfa1767351ce3fc48566977c6b5217eed1bb51e83631629a948063d8509300b9029e52305ba0ee2ca37a5045540382cdd21dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ef202bb1b54552e80f924165bd8315
SHA1c323f9a5211c844f4e49b3ca925cc9f336f20d72
SHA256edf16ade1b4c6369394e988b93391e2fe15206e4e50f38c86882492c983590fd
SHA5121d127cdd5ebddd85b2f2e81f3fa3ae72dabc0b2a50813fe6932250c0185b70e8c30ff3a7ffeaec0810387963aaa05bab10ac24373dd1fc6620897d033dab90ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f08b6c3aa2906f6a87ff465177e92038
SHA1f7cd1f3c5e8a4c98ad71aa4bb4c7070b6b69d9ce
SHA2567a1869803db936a9e378871b72ba1549ce41823b812833f66e9bd98adccfc68f
SHA5120df4d0e087686d31be8f791866fd926aea413d227e57bd8988a95b2c3a2c34fdcf64a17f53d459d725857d795c839b5a55ba66b7683df921aec3f307930cb81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf193c7b1bdf71b52b17178f05f0b09
SHA1ae358fe3d70424cb16c9c55ec4692388c2687fc1
SHA2565e726285459f2d738f0a0bca200e7a82678dd13bd9a3f556f782b00ed6594304
SHA512208490d8e5cd377c80f04362f381ed0bfc6549f8a8c14e5af375a97269748b0cf94668331c03c41a0b62b44a53824040145b3a02b7c9e9ddcd30bca9ddab5ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559da941943f3b5471a41f5e97cf395c4
SHA12c450f9a230db332b675a29399f427d3d12a6a39
SHA256587d7626a3ca50ef91e4ad11da06d762193e7b73a5932e66681308a9178d47b1
SHA512df73019b0fa9e342aa1038d4b5a3f8d0feada9bc0f1d4040a68f2735bb0e97ae4f43f41227fd65c4a959305813ff28441ba413ee1618ef4a95f2fdb01aeb19c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc93dc9d1ae7838dd421c7297980bc0
SHA10a0bfe1f964fe363c1778a166217f319d90839ef
SHA25694982dbe2ba586a3cd0c93347ec6d27f55589fdb065753d902c4bcab1383e774
SHA512326e30849b48eb73a8d74f4d83fef9e23dbb8d5ad2b365ba1608809a7bfb016036112fb558c75e325c590a6af2fb57bcfdbc67f52f559926455b7a46f0d145db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542816e89fd6cf34e0c24c6a738934e90
SHA19169c60dde54159f7f97b9ba8faf1a43eca48e73
SHA25695edd8592ff446d871cf57272006884f3d6f793fcb3409243dabc254ed4d2c11
SHA5124c0c768ccf903d8c05d6a5c6571a1be3711493f201a965e2af86577a04f177f9bbaea695ea1a750a0a11e5087f65ad08d7301eac14923704feb2d8db962bb623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f42a3804fad8253567c5c13a1762ddb
SHA1500800041e1ab2a428f2aefbcd17e0a10b59a1ab
SHA2568b26d8c0dded9fd5a4fef21e1a55cf079009afc0f700e9e1a356ef0290f861c9
SHA51268322d0e5f82a78badef56d595f07e19461e5ab61476f65ade9e608f1dd5392f9ef21c77add356fb5652741ff22b4a827f0d79a03d20d8870a10a990b73a354b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce185a98272e2fe3589495b665e12b9
SHA1a5658e6fa028af0ff1bafc9c3b1448c0fb9736bc
SHA25625080cfdbf1f20b27f7234986a5cf0f58c68ac1b8b68e13d8dbf6cbcce798ba4
SHA5123b1de02b945982df47fa9017b09c161bf57b2e2ed71225f9cf324e8b73f0dea04eb1e790c3940501df381ae6332dab9116023dbe91d24ed907a6cfeb19ef3755
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b