Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
eab0f8853857a350aabeb4b2d7c5f7a8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab0f8853857a350aabeb4b2d7c5f7a8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab0f8853857a350aabeb4b2d7c5f7a8_JaffaCakes118.html
-
Size
88KB
-
MD5
eab0f8853857a350aabeb4b2d7c5f7a8
-
SHA1
6770a650a1787b07c9c8cdefd878c343e452f918
-
SHA256
2168f699226bc37cfbea5dd2739a80e4c51f5fa8f407200751acb98437f03830
-
SHA512
13749a6f6f2035c546de71a4dc552bdaed4aa8ae4671901ae319090f975eff3e2cb24cf89c564f736beb1f09db6009db073414f73cdf9af3190d1a44afb0f11b
-
SSDEEP
1536:TyOZijpgvdndZI06mO1JfRHvsznwzQgOJziuBluP+qnJT6:okdqr/fRHvQTm5mqY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000001f35c3d40a6e4263765ab86b7ff09d04ca2a4ac057cb8407f01dd3131bf1ee74000000000e8000000002000020000000363aed9aee42990e3097b8d3d4c1965453362cd6113d0936d19d8b09f0a383a620000000c92e24a93d301fa89cc981b757281cf71b73896f46b706b8edc583ead5914d894000000000b68ed314c6d5451e9929357e8d888e98e3febcc3cdf6ed9929442fa73eec0d6faa1496905a2441292db47895bb7fa7c873027395771af0680852a362d5ffd0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886400" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c5e8bf560adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB37B711-7649-11EF-ABAB-F245C6AC432F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 628 iexplore.exe 628 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 628 wrote to memory of 2700 628 iexplore.exe 31 PID 628 wrote to memory of 2700 628 iexplore.exe 31 PID 628 wrote to memory of 2700 628 iexplore.exe 31 PID 628 wrote to memory of 2700 628 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab0f8853857a350aabeb4b2d7c5f7a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537adff636835bf02f34d96b4cde3d51a
SHA1e5ab66c03d76f4aa40f1a2442e78c4dc3a3f7adf
SHA25665cce68c27dfe578035d43545fb78e89fc5d71b0fe256fdd0ad5a2d5a804dde3
SHA5126e2259d33d1c7762aab374740e792d046b93a9b24c046ae85ab192d57b5cb148b1ff052074ced109c626bbf5b2af32659a4441a9fb4b77cc24851bbe9940ec52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b666054ca4bd9bc323f4385b84b09d
SHA104c507ddfa85ef008df517c2a748ac2e4fdc9173
SHA256afd7d607ea45615a15f42a9e4e5d248844e77fda8256edd93ae380da756b9bb6
SHA512369cd859b08428caa4baa5de861b233c5d0cea0401d2a824538d5cc634aec59f3ca778289d2414a9e6027762005f0884cfc7bb3ea1fb6328e7d118df2e8077b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feec948a45893b3ffcbb5782ee0b23b8
SHA13159bec1b05c1090e620bfb8f5f57d1b93e10685
SHA25648635b9a14ec791a3f8a50281f27f34cea9b8c26015c164a40b53c64b15cc4f9
SHA512156668677b43dd40f70b67e392eb47e5984af725cd5f93344480d5d5cabdd8bf8c88fc4c75101e7a313db819b01d87a3b27f9a294240b29c727eed3b06506692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5168e0af7cdab26262422a412088038be
SHA1e36603a1acc75537a56f1ff36e64030b02b8fb09
SHA256680885334253687c7734c1800d385843464bc565e805bf8c71facd4bcb0651a2
SHA5125944b028fe4bafc36caf580c3bb68d134007b4d82d05ec921e3fa6ce331c9339d245964eefc14a8d2240f2e222f9c7b547d986eb90eb4a10e43e7fba3bb3b2e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3a219a94f91c6700e8282fba2b5d1d
SHA1e4072242285ce8475b3ecdf9900e8e649206f3fc
SHA256291a5b8eb2f205e2b797c3e7425c640c8cc6eda64c20306c700974fabe3404b8
SHA512ab8fb808d726078e82ebdd513944f5cfb724343d34016165ef6e8dcfa4132c04f17ffbd90b443f060ce183f83a813c6880c902a45469d6b0c341555befd705ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c655a52cbdcbe91c34bffc44ce0ae888
SHA1d9464d6a62fffc4efaebb3177bf4e31e0a7ded69
SHA256ca4aac7fece213085a2568a5dcf5266608b821bd3506f4ae0b3b06e4d39656ed
SHA5127a35d92a4e862bf207c442d1129e8c8c1f9c1a7ba02515852d0e8b173c194d5249f44e6ba84ee40fd9a200f32f484759694744c87909051ca57ea74c02d8e96f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ff2118e91f58cc13c1865a0cceb33a
SHA13d539adbb5287f58484f17136e43bc00a43393ee
SHA256d40ec93be1ac72146b3d6fd2a4dcd9ace2a25b9c52c6cc651717144f1585b9f6
SHA512538c48026e38c7ce11d0d27b73fa1c438e47da9b487c26db9feb9eab02ea2ba711a4c18c4be01f3808aa2349193e094634a82327cb3f1a5ec1237bc21e35ac70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa1f5295c5f1832067c00e9c1021f69
SHA11fe35693293b480382bf9ecde01e9d0b013b5d64
SHA25689afe127073a215032f2332ca0ec8261028dae4416178d1bd098db02c791e353
SHA5120d414af0d5fa096743066a8bed14a38550e2229ae172468b3523988307adfd1b702c14d2811796cddb3ffc0c9c7efa03f743bc45ed7164cd1963ff3dc2082347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa201b71a6609092c7bfbfb58d3f67bc
SHA11191c2e55a397e65f99b9ec926018d6291c82f36
SHA25656c20ee2991f708b8f16427db4f51ffa3d49877c09b00fc238134358ff1648e8
SHA512029b301fcbd09c74afcb641efbf846d0e15c1546d122418ae6ad4d0397c03cb9b33da938c81be458a20fe95c879d3ee30da8e2736caf0ed913f44e3f974a4f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303913f951da81b3963341030abc6537
SHA17689f564a1a87e16f7f57907a20f30bbf74fb38b
SHA256a8a56b152276401472f893010634a620efcc959f148b2785471d7a7f439dcf2a
SHA512aa97289622c3e092e83af5df6f1929064a26d15e1c0e6eb0360f9d35a5aabf9cf5f8f03a7f2ecfa0fc3299c40c74463aae9cf320b9b4edaf6c111957404543cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738f22a4321bd32bef52544d70bc1aa9
SHA15220d1380d35a44b668e5923b0e8c2cf273a66f6
SHA2565028db5199d47d2bb9502e68a13e64110d05764aa4687fab840e44aa8b5992d8
SHA512b0baa83048091af018d459b8131745e1902b5c30e0dfd0f417e324a3cfae6a9f1a00509cfbfbdfa7abbfc093e756f0dc3bea7998de71787e8ead6c1f3343c2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867d814a84a689ffe5920f20767a9e4b
SHA1f5e847e3b913e265e95a91c40c9867dc169f880f
SHA25605501adf3eac751a2ffed32afd7f0d71551135aebdb35834bf40874fd9864a8b
SHA512e650f5b87a2f4f5fe4a1a968e920de717049c2db82e4b32265474e9709cf68c0a63b33295bb1bce433f30dca324889f5dee6d8322ff30aa6a171be8fe935c854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f6e1c314ce7e5fbd3fd7dea2fcd6c4
SHA14b4b096aceeb550213235b5425e4dd38e5e9aae1
SHA256569f5c9472be9680b6d16d4a6f05ae95c825d603b6dafb90ed73b346bc77e429
SHA512af5661d322fa4e04e2872d6f1f16b94e1745e1d22271ae2cbd1d2684c956228f6f76aca4c5d177ce315eb6fb4f51e56bbf09089b6cc96987f1e575d17ab0447d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a478157efb0ab01306c50c2f4626e0
SHA1b2e978df8762fa2a66fdb9350d1e184417226047
SHA2563584c7f1d7e64f54696ccb6b683204b067c792646d74e224b99c0059e8495bec
SHA51205297b5b36388e6a5339746b1a17c5ea77d9aa2d6dd257c2b876667dc4ba59de1efe5fe788d561750be3c2c4cfc9858c2bdcdabc0c52c9711920ca1521b73c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6bdfa7168ab6a3106a61b86c975b3f1
SHA16c5ede1feaae3f3e6f296380543d30d1fb821285
SHA2565c977d4260992a624d4f83ca367f44cdc31084987a2a0405198a5a2ff871526d
SHA512fb84d0b84f90f0757c068982b70d7b3e7dd588d4f05860b189efab2ce01dca74c639abc162e4ee90a593539b2e40e515931dd05d7c49cf6ccfe4837b186be2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572230794da9eb720552c0437131f491
SHA1000848b36765f00c70eec5e4bc652312f6cdda8d
SHA256afba48fa455b4076b12dbac51e57f507ad5a58e290c61032130094a3ac600cdc
SHA512574cb34163209ebfc91b575fd73a9166f924cd62387cb6ed3c16f28ebb5319f30fba41f958d522f887cbbdbeb554db7ad779f1b507ffffbbb3714c0ae01e19d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef8fd4940b8278ae58be3044829c186
SHA1c0937934bf75bbfa35b7ccd83830a4c53d3c066a
SHA25636aa2a8e804b14a52834df1d049346fb107024ec6348fcf37dc6762a1a130a6f
SHA5125e8c328aab1db27b42fcf76f004a64416d495eba7ba1d2bca7d9c048431351bb85c29c56c6ff1c9c1b354c5a8a0807db7db9704cabfa71ec0832bb01a2b644d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528cbe9a95230f5fbb1d62ee62f577bb
SHA1545982c2a44530c119e22b4c52ac391c1b3e1bdf
SHA2560c5cdf6431194e5f78e489a23f29fc0d99ac1a67b2caec980285831bc137bc08
SHA512d590ed8bd2730602aee4647af91a66eda3f4f4070e05d0d887aac93d81bc79d402aef231984197eb591b02b65ed6a00c46d9dade830f4cf4f2297792d2f7bf5b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b