Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
eab0ca46ba382fed3d27cbb5a7df1e5c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab0ca46ba382fed3d27cbb5a7df1e5c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab0ca46ba382fed3d27cbb5a7df1e5c_JaffaCakes118.html
-
Size
142KB
-
MD5
eab0ca46ba382fed3d27cbb5a7df1e5c
-
SHA1
86028f6f2935a5ded69c253ea38a5acd9d69b8b5
-
SHA256
b00c3f6f1604dcf7bccc41a81558914b394462249418c2713ddf6dc31860601f
-
SHA512
cca9e4a9ea15b35502b5b6babbd8df876f2fc7e02974b8933d214967b529103d1797b5041027d97a874768e2b5268264a40d8104cf301bd6e942d1a18417cb9d
-
SSDEEP
1536:AVWV061wBaidua1GA1dRBqkWoQobBhx51S72mFxtey:AVWVv6BaiEA1dR3WoQodKxtV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000044934cc54263c3717baf5adebdf9a94ff5725c8f3615683db15a56d95d57419e000000000e80000000020000200000009bb16aa45e4decefe9ad942760c68a61ea5dd5f4175d5c2b64d729616fe9564d20000000632e9ffcd720957b6a44b3c22a042109bc710216f0bf942629812f0d18441ec840000000a2debc5ebec557910ee3907004553530b64aad37e07bb3bd421acc594ad8f922bace4ad3ae7f133288884df197771c9742efc9a6f516a2fc3a7875960001c48d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886389" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701ad1bb560adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E548CB51-7649-11EF-925C-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2524 2736 iexplore.exe 28 PID 2736 wrote to memory of 2524 2736 iexplore.exe 28 PID 2736 wrote to memory of 2524 2736 iexplore.exe 28 PID 2736 wrote to memory of 2524 2736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab0ca46ba382fed3d27cbb5a7df1e5c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7830580730a262c00f67c17aa05d055
SHA18fad12509b80801f89d2c5d2dd899b0fff3ffb81
SHA25630f7438d283214528457536f3d42e5d534cf92643207ae532bc7c3cffe2dba87
SHA512b89d867e4a8da9dc1fdc2ac38daa4351d31af7992b308bc88a98c78b09b48aab2105c0f793876470e28464672e88d50c8b147f7ca260d164705511a67dc4aa1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a1704954dd902af2bb2f3e272ffbc01
SHA190597d33ca9228ad3373768be8011f847221e8c8
SHA256052220f38cee385cc1d1d1bfea2134020eb806eb8c30e2dac6472232636adcca
SHA512613be4c3ddd1f01222a1b1d9e9d6e7137002b6e91508738eb3648f90766a15a8993e89840c9fb3ea5ed81c8a632c4ffb6d4c53a88a811a3faf0b0aa9014778f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597dc1c9b3ee7eda273254e42326a2af8
SHA13a24d5e3decebc690521c9efb0d347dbb1bde84d
SHA25605618a5cf613c29e0edfc471078c22fb684433bcd023e30b1429f8e6087eb7db
SHA512be06958f4b77ccffeb66ba52e6aa9c105a209751c32b22a521ac9a1f1d5aea9278c6562088875edef480f168a43f9d0ce01df376fb300578f887f8965d250cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5584fc0748ddc6979b09798b69d32d5c1
SHA10b2584982367cdec0ce056afd735b8e6b2712242
SHA25617e630b46dbdde002f37cad6a95ddb8b08d0713ef0cff493313c54bf937adf66
SHA5123583f4f3a63ad5ba1809f3370f2962abcde196087d37f7dd624bd3747a5fc8afa0695e0e9f34addd5ae50801a7b8db402b69cd385d2da660cd906ba074781fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5510018e137a41e277c43fa619d9d0
SHA1256b55f607a20bb97bd02352779e91c50e0a3466
SHA256d0512c7664f1cbb257b8c87af1bff000af522bfe749a145e11cb1486313caba2
SHA5120247f10115afe362e281dc3c1be7094a1ccb63eda766b16a4e4583fbaa29975169a3383bb742ee0e0318eead6780597bb299cb6c8c7091b5acc1c10fd9b6690a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2e4e29b9775735ec6af4cfbb4f2356
SHA11502951d0081e658c37deb727b9f57a551f7d6ba
SHA256e02053b0a817a9542fa2507071be3948d43e6f417e2d6f285e7c78645fb69fd2
SHA512fe14674f42610250cde5f079cfb0112e63e0a22337f939af67b7fcc52ded7eea44efe75a600f74d528aff12be0950391d94ed6a14c3ac6ab91ab42bc418efd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56d8dd93f6a5d18d74e6272ff619a6e
SHA12fc5d0c0061005668d87f2a4cf8044615e9d6131
SHA256285b2631fd23259f1104f8aafaf2a55bd6b4284e9f02cbe43fe6e2611615dbf5
SHA5126d560d0c306e31f75fc4e8cd34bd164dcf5410fa0ed8142315e1ccb4d3714c8987689f6d6141ddca5062857e54c66e86c554a375fddf98e83bcb40501c517721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54270a23a2e111ae7f8cd29659bd1e35c
SHA1fe06884ece001bcb222fb6b8762ac30a62d5fde4
SHA256c91cc4e1e9a1113936f59c0491016c5dc608eec3ad2bc426a54d268bd2fa9347
SHA512b368c75ba41732e05b5e4bac627fffc3970a3f9bc6546af05691d835277ca7bbf6da47628a7647bfb7b1761616b14a6e9f175c7841ecdf58b7ffcfd844b0c148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541264f6473511b98d9f50995d0e3cae4
SHA16ad577b43f49f3630ec67d231f7b06dd1b5d497e
SHA25682c0968b1ca86c3b76cb07cf1688df873c7e65caa165267c552f8113de2afd1f
SHA512cd5c1d8157cfc82f1482abc508398336259ba0a974e1c603e5b84e52125a4594b7cfe1557838d05cfc159fab71ccfc4b8e7a52cbdbe93adefa21b93c42a1aa0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c124edb3918f867de27c17b1529985
SHA1be8b689cb51e41a36571a2fb85e9c007022d3399
SHA25617485d25a13e343e2aea7420c43d844f53628d561e3d9460caea7889b8f71261
SHA5123d8ed7764918d4c75f52a1895de6ebee36301789ae05c83a04453f0be3ab781b49a2227a7f8433fe13281b091ca20d362c568cdf3a36e4ec8901231350a984e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6c1fd073cc31acab7794a799c2c0bd
SHA1d4715fa62cc0b27e2c83106147d1e0fcca98712a
SHA2561f27d2584c5d9e8c7ff92fd52053f865b23c436a9604db7b5d7184e6bda4d2b1
SHA5126f79852e5144e7558d36c0355d9e9413987c4f41548dfdd5b92a399fd4d6a318df9bba79d80b1967ac669fb6e67d08adb558bc0a4b9784f12eeb4066462c823d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7d9ed01938d171f595111e23be0974
SHA16be527ef904ceb8c89d3e3eb63d1685bc20a8f2a
SHA2566c4af5339314503330538f9172a14f00d5a651bb50a56afd24ca7f0620b4d120
SHA5125db2a3dc96872370096cc0f02c1f8d7c70d004e18329fec8414d12c71a3e628a35e223a2c35f4986a5a090952d2c788d6f51416e5debff6eb2cc1c1ac5942a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1cf85fab1b242520b7918e24acc0589
SHA1eb8a0314b13a546569d54af97534c8d224159063
SHA25642358ed5a5f6115037343f121fc4e218aae0b689467a13c48e91f9e7fc7b58f5
SHA5121463363fb5131641fa2feb594eb203230cfdfcca101396d9a2b13c8a0eb0a9fd9587252a32a6693cdd0edad7b851de738a74b7ebf5ee2d1826a8f83576cce05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b50f4482800dd3cd08a266a2c5bf121
SHA1bd3ee8e9839846ea0d3b8c70a0a1c371fcda83d0
SHA2568f45152334f32a570d681b8aa4e8725b0511273ba15dcc32e45e5564ce9f8639
SHA512ba3c7a80defafa3a60a472d91f8b6e29e64c602c2230d523a3053cecc83ee476dfaf1314ebb95bf6b459b1c2ef18d9ee44b9981cd8d45d59d0cc017da74ef466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a93321885d7b37aeaacf89d8d94308
SHA1ca29c0d8b9d0a7dfdf8f32d00545525c376d4849
SHA256b124845cf66d363f6d82981267a0535a3f232fc0f88172482bb640b9bb1fe752
SHA512bb75e7999e45ccadecac6ee31dc243cfae1876bb4ba7274b6446e1936f8fc0866a47b3d752273ee29ba072dec61cf159ca2b83dca69b27419022f7047aaa7891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574fcf92c84353a037fe57f31cd5a39f5
SHA12721b88b37e0d83576841b9056a2007851307147
SHA256878d17349ae9d40f84180a834331dc2a5f23adfb3683c25f8edd5b60053b7cec
SHA51219502cb6f366d57660a131841583f74bc544d27a17a643b681e24b032aa924fb7d32c21a483e0176425e47f9d1cf393c4c3ace9603fab618c21bbc05ef15d42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6388584b453869fe164a36077175053
SHA124a77540c24ff9d6c9d2d29c3b64ce3c7db47c61
SHA2562c6d6b0951bf07fd635cb5a9ca0f48978da67b3d53144199b9a068113627c377
SHA5123cac72565faea188a9ac9b864e2cb8173c4edbbee5317c702992c9e933fe6fea0cb8738efc4b895ae2f7df01c36b0304e8e314a21b2d1c53ec46b67d43e47a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4d7ef4a62885ddf039bfd2400c3586
SHA1e0308c3842491c2a7675a6f47c3fbe6ccdb9c017
SHA25620ede25cb0741bbdc657dd54538c930fdd551f000523a50b7884da5f8c4e1c10
SHA51297beab3212e3506e3bff5a9e3e8af6482c20ccb693a7309c27060153e1425dcbc7805adc5bcb569c3feee019c1c65890a448a97749a9c6ea002cb0b8aad01ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114e650aa903946bb4826b641d8ccf2e
SHA1f592ceb1d56202b416ac4ea7310973bf9bd4e471
SHA25660f39976d4f6d438c16d029a00943e76dac5169002de1594d83485d937efbc19
SHA5127d46538d8895809f8145892b109bf353ec8fc90730c2e9b4bed51009afd6c14d09c6751a878530e41f701b12e187f10d57ae245dfc309ebeed1bd7ec1b7e561b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b