Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
eaaf4124343259330b19f7fa9fe7faee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaaf4124343259330b19f7fa9fe7faee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaaf4124343259330b19f7fa9fe7faee_JaffaCakes118.html
-
Size
297B
-
MD5
eaaf4124343259330b19f7fa9fe7faee
-
SHA1
3cb1a38dac612a8e90a4173fe94d563453b206d8
-
SHA256
d3c1104ae7bc4d2ad82e2d72cbe7ccdbfa94f8007792110abdc0d4cf2c157e1a
-
SHA512
9e0b83b103c19a3e6c7fb9a910894ce9ac133047cf3306e2730c44f0e1df317175512f3e7eaba56413182f0c3f63ab67add9588a8d36a8728b9ffddc5e4149c8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{458B7BD1-7649-11EF-BA5A-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ddfe19560adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000093a190593428db530bec2bdbe6751f46aa9dca99e94f40b7a422a75131b1afb9000000000e8000000002000020000000f03261c9d02cd72af7259190470231fda0ead9206181f12fe7aec2008ac2d78920000000d1ef206115e0f0761ab50928d7e7f3c0ac94fb0271c4f1f20b8424e96465f53a40000000380b4cbc7d9ab4b4de1d1dacfeb290818167d73d61a887b6f6c551512f397a2874b7f7e240bfbf476e7823e0f47745ffb6d968620f0f7aa108212562accb80ed iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886122" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2840 1820 iexplore.exe 28 PID 1820 wrote to memory of 2840 1820 iexplore.exe 28 PID 1820 wrote to memory of 2840 1820 iexplore.exe 28 PID 1820 wrote to memory of 2840 1820 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaaf4124343259330b19f7fa9fe7faee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e5f864e600831d8f964e580046bc66
SHA1d26efa700bf5340bfbc8e28a31c7e6986bda029a
SHA25671c9dda204fbb3c3bba6bc84e118bbaa8ab931162bfe8efd2f0512fa85014122
SHA5122b8a3562c95488b7a54a376c7beb393e5c60d823941b66b1c600e80cd7f720e923a026fcb374ccd92db7607f1b639f67a80f5e05458c403336754748ab68020a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502cbf91f12880f97f33a4ccf67d384c2
SHA1cd32c95aa2d217e212f70b369a7d86deca1f9a23
SHA256a22b4b02ce364be01bd4edbc37a115553ef0f7888f372de7e6e479e1d47c2090
SHA51227b341dd3d12d70e29e708ff941a7091ea6661e2d03d6e58e0a06a4ff3cfd9051c999a22724ea23a9c02d8429abf96afebb63033f7ddbe3f37f5d9b13a30ff3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51151dfd85a62a8d70ffcde2cfcb47ab5
SHA199d408dcf61eae05f40ffb511bcb30a78b9446cc
SHA2563cd1d27f882395ff58ff57d2918384e439df0752d5ef37295f216a1528241a47
SHA5126d465e92914f86988fae2456cd148bd4fd4a3fbf8a1281b9800a078b94697fa27addc739cab053ff0ec847b4383399c4a6281c0e44b6fd6aea4114abce5f4c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f54845e6ba425b51999e3758e07c119
SHA16fb7d41f52db1363c00428b2147e11a7be0664b2
SHA2563103c242dc01cfd273520b88f378ac6c03a8ff6a7daa2c76d85304d42c1538b9
SHA512b2866052606450486aacb42d34b374b3947648fea1f6e4ed6bf312cbdac093e0bc69d4212e495b5680f1e41b710e7666e0a40646d1556988f3ff97c10baaa43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32b06081b9729cdbabd76b7f970de30
SHA13f8213b4fb4ab006e621adc553627b6ed2d8efe9
SHA256895ec6400ebe93393d0ffc49a0cea0c6d40c2a3cfa624504c457635b09122531
SHA5120c50e52586d752e086cd024d91cb108e0dc6daa7610db39616c36460c0c3dcf6ed68fa6d08ed811ba8427e5615d56d8f49fce09407f6fb32ea1c001d12683083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d2459ae03c781f14d8559f732f0889
SHA1292b2b14fb3843854ea99197887b2534d2c54256
SHA2568b9342f72c08d862be79fc0b8fadc926626cdd7149d5caa0b6adfcd22270f3d7
SHA5126b1572f6d7d5ceb5499c00b517592ba9c0ff9d8d1c039669eb4bbb07583995c9da361fc77ed0ef2a1b89e7b8b6a3a635907298ef094d25745b31cfff5c41f4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58226d5db3c8e3d3410b92fcecbd4c38b
SHA1df2654f1e6b5b4893e54d19407f473a9cd217d0f
SHA2568741eb6d66415cc36661a97208b76b2fa7480563cbeec85d816641f7fa533ca9
SHA5128d9617404122876e308b45bca91af7c77ed58bbeee196cd03bb684ebef539a78db44581b58599f266c8ff8fb2049fb26cd963a0cbb1d17c819b3bc63fd984ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3ede916326a60e5b4114e385656617
SHA1cda3dcc67feff7685d59ba85dcb8503a20634f2a
SHA256821b07ba7b9acb37f7d7462b77ceb12925d3542e929bc5e8a89c209fa74c5b5b
SHA5127b3c8cc1ed029b0d53a593715e403e7f45688db6c405f79b5c9989fbe83f03e7bce32891fdd4196f96184cd51e12f0282b848baa037fba94cd609c12a6899900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be726c4bd7699fc76cc2ca4351e0cc0
SHA19e2d7221f00b703fa20752c67c836ca15d1c78be
SHA256c7fa4c0d06802ca6f434a4dea36ee9037f971eda33589b634f3ad1901605c3f4
SHA512ea6b2b3ab7f371d6c80c1a834cf70275d7a917bb2368dc8eec91866f6e0d89860f31accd18f29211b3ef0994ba6027bb9a98d828251d4ec982e94d7aa121ac65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0fd71497bac130aa860ac98693c254
SHA1592ec2b6bd32c4f842fbb2caee2b906f093daa21
SHA256cc422d73360f6d2e0fb95e73decee7946c41c41ed53dbd9edb9c721d6f1428a8
SHA512217d8ad133bba21249af91ca05d8f72b59ee0232c972c88ea5948857eb1e7e7541aeb38a7cbe077f737601864bdaedfbd370ccff641d9acaa1ad24327711cf88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b7c7919168ece24b83193cd9d2c1664
SHA17bbb1d1674754e119cc403f85f5d11e10c4901ed
SHA2564cfc30a83568c6756d9f221972adf6d5a3086c82dff819ac15a573ae49c642c2
SHA512dc4285280a6c60e5f0ea2377d03ab785ccfa8a2ff2f2f5b742b1993f8e03071e6e3e4e35a8a8c79987b0c92ba9c60467670c6794c0d5ee338e9d8758b664c1f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504190613b048383be3ee038ac78c7e2c
SHA153951bad531282eec9ffe71b635caa869fd344b3
SHA25659caed37a18df8122bf0bcc289a9b8133c5ec4e9e5ddb1b750cdef435f360b2c
SHA512b37883d73c9d278ef6cc383ff6dbc066d447316fb6fde21d43f4daccab9e08c3ae9d7e68444523e050c5cee7a68072b6f8b8d5d99902a609ab93740a34b5b8d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6633662dc4c822dff3335ecf0ff32d5
SHA11f959223be8320dd65ac50e450f178ade594c01c
SHA256edc67197c3eff37dfa2634d378d48acdecb4d12ad691797b0fd5628832da50d4
SHA5122eb9a0ec8d8fa73b18c0bc8227237aecdd9e5eb4dc8ef6b863de1d4400581b4970dd0837e9f6d6d8e66db709f71be79e0a725e906b0a3924db5a88c79d072c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d675b572cfadbe5dd7df00b462d5f1e0
SHA17e66b92e5e0cd66a589303bda37b2389c45aef9a
SHA256325e79a1e2053a4255e02eee1745a0a1b694bab2dabd26dbb959c6ed6ed525c4
SHA512e6a231c8f135cff80ef8ca9f7dec1da89a8fb93d81bb9fdeb9efd64ec4c8bec500d1f9561a38f360cfd6a7af576d80ff7c79b86d6157f8dd917a877cf9db1010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379a84db2fc60e585d6407eb9987a1a6
SHA155c773b015a1a5d63c7672dcb92b7a4559c413ba
SHA2566f9185702cb5db6f4ec9e3dc54bd5d138219c5e9b98684b7c1de00d44051d834
SHA512f9895240009138b68edfb9e7529721325dcbbc499b3534db5307ad9660d15ee4bc3065854470e279ae8239a54452d0e91cefe4592e1163ff5770b13cb5ed6686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfd09cc3e2490118dd136958a26f8a1
SHA1f8ec19b5b0cd9c4bdf5d92ad79599ed63335959a
SHA256b8e7c03a60cb945709054ca4f73802fd1259b97611a70f4be4be5d261bc0ac6f
SHA51246635c7624c220b627735ba60eeb7b8d5e262dec7910629fdd26ba4468c6778857d304a9c2a227e9c3afe26c3cf553788807c4ba127153c4eacf1e1cac3d4723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e53321aedb38cbff455728b04f5a67c
SHA109fa0e86217662defc83eb637b40f8749b97259d
SHA256fe43979d80a526e3ff29e1e24eb5356353b04b00dd0497c099101ab12dc973e2
SHA51203f00f39e7cb09e9739236447e456935b526314073672a8e186a4f6cfd382decd52deec3dd3c772ffb59ee90ab8005b2925009d5402eb79d1ebbe96341a42512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594e79a1e46e5e592db20f468ed59372c
SHA180c744684d5a12079c5bb05d01afe61054dea467
SHA2560a9f89fdf42302a3af0221a78c9b47829b96b7b6c8ab04fd545506e3b0d0fedb
SHA5125065961051f1bc5f961806847bca96507d80de60745d98f08d17253e04e0ea959685cd63b44a58b4ba246977a7a1ac886a4940141ad3530e4a17ff61200aaf56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44ce651eac9bf4d7a717888b54a728a
SHA132a7411a6e2dcf36f8ea5ed97e2686135a91e285
SHA2569f097aedaf221918505677e3ea2613a0f7da1e8077a253509c8badb69aa7abe9
SHA5129f3a47fdb5ea9b4ed9ededcde4bb8dd19c194154d7d0b575e4442c5eb483b1fa1cc9f6f65ae3c33d189fcaa94657ea1e040afa33681a2fd25e0ab97a7604b3ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b