Analysis
-
max time kernel
81s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
eaaf0befa0b62a95228eb5ef00420f21_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaf0befa0b62a95228eb5ef00420f21_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaaf0befa0b62a95228eb5ef00420f21_JaffaCakes118.html
-
Size
148KB
-
MD5
eaaf0befa0b62a95228eb5ef00420f21
-
SHA1
efdde72f6bd0e7cff63c2b0d7ef7277baea16bb8
-
SHA256
73fed9ab6921e52de1398df313cb64a5320be2601e6fa3b5b9288bec6a4cf510
-
SHA512
619c7759fd5658a98c991d81b3e0020b08b0331cf4bd94f4f28e1f588bdae79c08465db4dc1b410d3751af2c54f02509bb699e69cd4df86630af38ec2ac10769
-
SSDEEP
1536:GbrZ5JI64kNd6NH3oeADnbsyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:aGyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36182951-7649-11EF-B6CD-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886097" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006a2aedd26e7b317980a11c1b3a7dec947c851546d389d1caeda4e22be6c4e278000000000e8000000002000020000000611af3e98d09e0e716800e4a7cffc1785418601308cad797e9dffd7f1b9fb732200000004be44cb66190fdf1de2c9273417c7a48251ed1fda5d45cf5116e8ab5edd277dd400000009d751413b2a820d7c5f4c565f9c8fd9bf7e4303ad67f25ac4579cfd29616b56bdb5dfffcbfa575c125129ef84f44cb7258e7187598f45a9d100795526b72450a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2078470b560adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2960 2216 iexplore.exe 30 PID 2216 wrote to memory of 2960 2216 iexplore.exe 30 PID 2216 wrote to memory of 2960 2216 iexplore.exe 30 PID 2216 wrote to memory of 2960 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaaf0befa0b62a95228eb5ef00420f21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648be968378d25816377adebc867646b
SHA1f8d933db4d135256c58a06e4cdaa5b608d93ee82
SHA256039c6c32cbf3c8504f648b130f5f31b2cd86f685c499e3395d13618c7f21f51b
SHA5126935d5317ba347ebea747bd167d261532ef73c99b4a103ab2df9e812fb25ac122e38cbd253037b2d6a07880d231a0d2469a8eb7eb09af5d1f13cc54610dd8536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78e6145335c3032b15ae75fc168b000
SHA100ff1ad1ad12e069de29c84d5c8be3bcab304021
SHA25612c6858a9eda2ad3f48602201abc5f2b8c2527452b2697a8cdf0737af60fd94f
SHA5126c1c18f44f108fa5ba099e780b97ce8ed613ccd7e4c3d6a93c4af68c49eaf58a63fd7c95c157516e4c7c2b0d7a9359c8ec3a416f10f2a0e9409434680b4b3461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571fdda6cd0cf477280afc4cc4102b96c
SHA1d668ad4aa259a0422949ab9b56151da705777545
SHA256934a3233078a049bbd4ba32c23c04aa6d37d2f47c0c1c0a0fa2dcffac46303f5
SHA51241c0e76903cc64a9e2538619532a5455602680ca59bdf5781115e6321181d3fb4e88f78d66053e1cd9c4390fbf5262f94b2bddc91ffab762421ffb64000a0909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e82ee568620ae41d112c27ff7949e7
SHA1a8ce53266d0c32ac83e66672a5e84a006441799b
SHA2560976b8a0da90db2879e5cce761824bedd8f65448d36eb829373a5d66eb4b7ba2
SHA51293c8baec48af8d4b20af2cee061a0f2ac1e2e83f88a2aaab4445966c618ccd5c9bb9f83b4c030f142d23444e574f5a3e7b785914ce5fc7604993799d2d328a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d93a3ffaee7c8a7891bc65a317876c42
SHA19efe7cc73688adeee562215c4bb5d0d5044b7f0c
SHA2561d7ccd6cfaef44f07d4bdb59017c0e2331d224b46a907c7b64735486ece977dd
SHA512a187c3a45aa67b168657b10fbdd88b1ed48c417b78017976365fff76a534823203230d186c09e3d487bf0d431fa4912138ccbc1f1d74fbad9e9d4d45157283a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f1e71e94a705b438d92a59c681acf6
SHA1e7521091b134e56d03fbfc973fa415dda1a297e9
SHA256b89eb09af649928a74ccc3523d6f8300e832bb8e9460dc4730eb694e463be58d
SHA5127ab15f33a4de636bd1b849481fb6d9bb0df075345e33e90312844b31299607077728f755a5e5a8cf5b7c68ee985867246d2d6425f37c3a096431dae4c0012b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549924d5477ece4b698a36104350ebff6
SHA1a55986fc7e3a6c632adc302e25a2294f02f33f67
SHA25620b0bc4ca5fa0e005eb1e52c0da1b5902e1b710e12c4cfe3f045533b760105d9
SHA512797a5402368adff580507a5103cbca6f7aef754ef901f1d8e01916d383ffc31ade0013e9cf9429213c9ff0769b11104132aad6528986420bfb9ef0418af97b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d79bc08aa2b56996fe6054c859fe838
SHA15375f24c547ff506bfcd7a8734a9802ac0fe7c00
SHA256f4fb69b74d8a34f13bc4f866a2ff5eebd44f7786a624c5b119d94df4df80ecda
SHA5124a50beaa91c13fc70e2872de7caca465a4c0224b051fb31342ca568f7a586ded2f6c79952d533b7c96ea329c5eb5d6270335136eaf2e3908aa425c00fb902780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006de2c30cdc2101f8bd2b6bf4ba45c2
SHA1f5d0c18ff3c10d48b8c3f20a24d4e3d995a3290d
SHA2566f38cee0eb6e2140f51c295ea46eca4d0ce0f963d1b731b38d28c50befa11ad0
SHA512baa8130460320ef676becc0ec24c31f54de09e06508c22938dfec0cb85c257647f7e345d87e5b696261bb846f379bc7528cf709a5ea98a76a20cf3875eb49e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0c0de34d6b0a6628d2e72e8b251be2
SHA16b9f04dd43bad40f3b9f9ff12bb859569e6769ca
SHA256404bb1c4248e0d0305ff30a629845742cfa335ad518afc9bf4193be9dfc559dd
SHA5121f3e159573cecda9f5777acdbd4a0556ae0f67e7474356c3ac38ca84c38c2215d67a8160b2b1220dbd2016c943c2a56f446a7c264954d60da06f060ff0a178e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eae75b7ccca3b10f3e16e6d7678f80a
SHA18840d85387f69830e0d8032f18d8ffbeca759b1c
SHA25623e06beecceeed2723f9c64653358a933e50326fe2229956348a6b4b4ee19c9a
SHA512709a5336a1c1504cf7f152d51b94f1371a69bad6933585f76081ce9d69628fea91c5f284ade6bd89ac205ff210380be17e968c866937808ce956d0b31207a38c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5beef8dd9710f83889a3186065ce19
SHA1f67a68ca61455fdbf88d7ff134837fddc10f7095
SHA2568b36b9b3f1688c41a2c43201494fe2450d58af49632f2a249ce0ddd4f0fde22b
SHA51229b868e736dba15ef5d562b05802ddc5ddc1acdaa8136df2191972bf3ee0e699bb355ae3bfe8e76632d7f753e9313683d9360bedcda3fbb7c274904341f02226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578bec32094c9dbea254585127948ca5d
SHA19b1d8d6347d762e9e1a5d3e19a8a9ba62fe78fe7
SHA2564b2fb654e145110362e721bcf8973894c394926575640f224f386118a9e87ced
SHA5124eefdefcad4109801e5833f4a4ce1200fa94376cb5a63d1308d6ad6d47d77ccdd7698da0684a329fd9c50c0d4dd689da03277f3dcef50b11be4ec339a59fc603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68278d89b6212afd878c7e5167bc6bd
SHA172d584514a016d499854dd086cd4bf49755db7d4
SHA2563218ad68b85c2f8692c6ffe48c3e1241c8efbd4caba4726288a11532e65266d6
SHA5126781c5e8b6aee583ddde175c4bd9ba843ce4e14e6ebaba70effaccf7a002ff4594393711d6f786e52f2cf6eab99671cdc496ad9f9ca46c660455614b6859d71c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85c164c76f610e292789a54e4836269
SHA1d128b2c9ef9a6c000395e16c500e295847581247
SHA256e3e942d50f896123e4703dcfab846c75a6653e84ed9dfbdb1089037a5df26e3c
SHA5129509f4a1e0602330c849f0cd0120c0ecd4a29f90c64ccc41e5da1cf3ff1b64ebb01be09a6865394cab8af17e3fa62357fd70d39fece5921f7a6a0334b9364971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b3f7030382b1ad370ca1131b858408
SHA13306056d7310e88e2da47511c1fc085116876441
SHA2563a334d5b91882ba759ff5b9f7235b9f418a5ea3c9fc3bc62d12fd3f56bb85871
SHA512bbbd620bd4e27f1507ba361ea7492d61e6566f0f57aa3a5103f061e0fa2ee07714e9a860ae2477208485adf4d56125e90c693fca0fe96605731c20231815743f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b