Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
eab203038eb16f8082898ca02832e3c9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab203038eb16f8082898ca02832e3c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab203038eb16f8082898ca02832e3c9_JaffaCakes118.html
-
Size
463KB
-
MD5
eab203038eb16f8082898ca02832e3c9
-
SHA1
5ba994a162af09b09a89418c7b0fb83c27dd39b8
-
SHA256
12da07ecac2d56c3f99a41dfa8db2ec8b9dc45ee26bb837ac4f4cb9410387171
-
SHA512
05c1b1dd4204ffea88e9ca584a63c4c4489fddfbb09df42b8e75be8e2bd22354a30be07d923eb56285918fda5ae49e6b6bfc3e48fc8e8742357d1dedb89bb373
-
SSDEEP
6144:SJsMYod+X3oI+YZsMYod+X3oI+YjsMYod+X3oI+YLsMYod+X3oI+YQ:u5d+X3L5d+X3t5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c4cf36570adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886592" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E45D8E1-764A-11EF-A2A3-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000027dbc864e0056079388c58819e1873e674d82cd3902488835eb7b4ac66a7ae1d000000000e8000000002000020000000c04a67b52a0ebec320d4548457815302eceaf1b291ee701a7e16d6c4bfcc25b220000000dfa66afb7cab6a05151016785f281c56e381a052b1b1a0d48863563d2127266440000000b53137c3dcb866915dd7feafb615429a4823d955069ecb4e12b1b61b0b82907728c5afae20c0c89429a50bbc76502ccd162250f9ac92e7ad4252a5d5d3c1a33d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2812 2268 iexplore.exe 31 PID 2268 wrote to memory of 2812 2268 iexplore.exe 31 PID 2268 wrote to memory of 2812 2268 iexplore.exe 31 PID 2268 wrote to memory of 2812 2268 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab203038eb16f8082898ca02832e3c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c14ae125f11d34f5a98254b3b14fcfc3
SHA1ad8bba117c2d5c70d3c02e1b5d36d7d3694ea138
SHA2565bb096f7c33a14a00fda77cf12a554c2d9ffe0f372fa5a62632976a16e4d99f0
SHA51232901cd1b782f55c144e80089e9c592e4e24116f8f10e225560b948f3b41ac292c0640a5f74a0d02c62ab3b7cd7651cb957917882e62ca63e3bfe890c33f1a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538d046ca96e5219f129c7acd4848eb79
SHA16aff4f4c7011c76f195049dff080059ecb37c725
SHA256a3e4ea986867711803e18a858c7ad5d2f90874b88370daecd26a48f212f16383
SHA5121e5c53c4244f57054481725c6e71dbec259e13c64ce80706c96e19652ca13ecb3b8d2570866dfe83254dac845a5b895599e719077b7bd2397b3ff63544fbb220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a1772ec07be502568198d02542de21
SHA1902a66ab389996b539299cf556ffb0672311a465
SHA2563f5f76eb27847fd7c95fbed2eb346ef2bbd40ee630bdf12432d99e7f1aee1586
SHA51259c80b01653aa8312068db9e753af5c182b254f44990fb218a0b06eb3316fcbeea82c40d0caeeae29476547de97f389e6fceaea88596aaf52ac4c0e159acb612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e83dcc9285e9489f6d2c1064cd85562d
SHA106a0a6367207093d8d45ca630495833f8e0f9fa9
SHA256d3480a69090826e24c3f04905e9d2edf0651bf5e2ded6f261a37dd9a1d8bfa08
SHA5125b42f26e25aec643492f6be5464d4fdde69a31d29de6a1510a80aa83fe8dc5dad8682158e1256591401052b17d8c6dc6b14212fa2bbafd23a7508dd340f25e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58120cbe0493c1b55aba535cb77e51b97
SHA19022e00a314631d98b094e4ec84899d50dee2d0a
SHA256035bc3dccf003724a3aac8925f41db50ee2c03814094c1f3ebbd3c5d3e9bc5b4
SHA512d77c59ba572e8787d5022874785bc66e17318537b749bacd2541241988cd794cfc7d55cf61bbf7d94185b4ea6a7f01b596c5e364eddfa1f6728cb9f06a4369e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59810b2760bd5a3402a0ae607fd485bff
SHA1405dc0dbdbac8932ee3c02aeb5e6f81917912164
SHA25677820a75ea9ae973b9b7390de3077c6a9dbc101b85344ab76066c8e9a28524f3
SHA512bf2c44900586b2794893d628fe08b59c66adf4e3296f3325b3026d5fa7385d3e8db4ba8bc7e95db53a3de054ebb050b65170a351507747985c5b8aaa25110ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec9588a3357d79d42a229513759595b
SHA1ecbcdc062e1ecea9447901167f976096ef8d0c6d
SHA25623d6a8366deb7123e8ae37db227230593aa131e93315fb0508346791e509886d
SHA5121b0d4d1898a2b640517653f97b9918354525a0c51daba9a737862a0e2e2536b4f13892f10ba70d1965f258ce8ac85306acbfe2ec1f7be4a850f1ebdac2cbef04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a5bd8f99c4e96b37570ebd03db0ae8
SHA143d6831683841d8127360bd7802e6606d7374ac7
SHA256e4b8451af5fa389721cb82a839a04f533c52c0b0dcde7cae849450571d855fb7
SHA512591c0dbe065c652eb8e5f6ea47f0297e87e8c6d673cedbf85b580548fb07d22d29c40a3d8b581770f4a254e697e57374384fb329c97ffdfd19e21e15e2145594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a056379ef64efd31ec3219fac567372
SHA1ab3ffe2b90207b6498c3ac56db052c2d2ab32a4c
SHA25627fc41b45dee1960b461a77c666bdcd9823e75f0cb1ed1fff9b1b76ba1de413b
SHA51254a0a7c3e7212831a0d862d07cfee1977e33311c88366fe64871e1ee08f1ff20c1db2c0d036e6669d53cb02a2a78c16b382b3cb35d956f554400ef6f5b5fa053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547fc169c262bdfe92c48334411276dd5
SHA125688f2d1f7cfc193975da5f14c51e8346c4edc2
SHA2563619b232e64252d67c73ef5a60048a20bae7be93de434b5aeb641005a7bc9c8a
SHA512277afba762608dfb0bef176ef533baac84987d14e2ac01141964236311057a63c51ac266596f6f64019af0473c6077f72a5638b99b43bc4904c0379d51a14aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54e1cd244a741761fa039ddf736ce9e
SHA1675486a83232b4ebbd3fc1b021352ed718492df5
SHA256dd19152bcce8fbc390d477bf939181371fea48e0e8e209e4be8572badde3065d
SHA5127bad8958b3d188bcb96ae90f60d8abaf44cd8d4c4afe95f1a6f6b9e2ba723149db46716f96001263c8cfadadd89726f143a7848a0de1b435e299821714abd164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b0d0ec0fcd1adb6082c0f1374d9339
SHA1274a62908d4d218c724616ee13422f5ca2bd5457
SHA25695790a15035cdb1c1704d25b4c5a2456663c605634000a7ab756a124f937d5eb
SHA51223abd00b2d5b68154267b7e15e300e9bd4730cec88b2a8a8a27c0d45443b6efce229719aea4cb5c6f91d35b9472e846f162525077d0e355bba322d8b7d062e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e5664d754c05ae33d3e662666ede1c
SHA1a18e4fec6d54c94701781bf80ac8ed298dec13d5
SHA256769afd780f8b6745149d7c2722b28b0856614da89884cf7abccd2062d896656b
SHA5121ddc79042a40753056d996318b16620e0c11e711e7bb751cd216ef97c4a5979a6dda4bfed8fffe8449250c0e9f20a427658f6154f593f13d1dbf61c91dd07b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a9a51e9b72213e2fc5143514c1ae74
SHA1c7f9b7345a875517ed39b5012b7291d26373baa7
SHA256d5800fd6dda81b7a6d1aecc732b082498a93bd3e544b1d6e172aea91ebac2052
SHA5126f89cf745de89fdf7ebd42aba49156576f08e56abfde738f5e091ecd99078f4e6ce29c05f6fbe13c1c1b4cc295a4c0af3d1d4bad5f847df7c0c85d82c0bef0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bee65b221dc20b1c18c5c36c0ee5a73
SHA1be93a4016466e699ddf1c3060d5e6f84d166c3fc
SHA2569740162c2fba559d41b2fa1c3eebde3b2ce6a9efec700604b29d58146805c946
SHA51222be651392a7a8d2ffd51eddab3e6bc23020ff952a0eda42ca275757631f342b75e506b4621ff122295f8d078ac248fbb931f3d04f30a0b38ae45c8eed337751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7fe3c7daf4058ac731551e348e42da0
SHA1835666fe3e96778a62c53dbee8ca9e2fb9b28bd4
SHA2561e7dec6b73ef3aabde12433c1a12cb39816dfec4c387810c4bff6438b8058295
SHA512a1d629f2506b5cc33dcfc7237bc6a3ad3a5cd39b270d267790e4397d673c3b7f19eb1b7922720c11a69bb16d1a3b0b1eb849021f2a62f5239b57cd63b28f98ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501531b8f140587bee58acad3d93f3f5c
SHA1b59e9c6ba045b9c09f845ec97aeebc481fcab1d3
SHA2565817ec4da0f4b13985fc4d3847f436d068e6d522e59f975a7a97cd28360b5c56
SHA512d9f451da0f4172b41fd29427449ca7878c6bd2d70e585155d08d9e77388e14abeb9c7fe6f435c19fa14b4105039533ccf422f136874a33d72776d57bcf237f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab10ddc43c44d234ba62baa54937457
SHA13401fd26ff4e2d32b020cea50cb0da82f1d47815
SHA256216c22ee2228e8b0c4322571cd610b1451099f632201bc65af9b6371fe50f32b
SHA512c3463a736cf32aff178be1b266c78b90172ac3c278bbc26b405f169903a7b02c101d1b11462803155fe8a45cf885c862483b5c4c58e0a66bc4277ffd28a34f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d1839bee2f9048c987308e0e56c83f
SHA108d0f2ea91112dcf6ef1040f28770d31625c6cae
SHA2560e6e8064ec2e224b20d573f9c2fc82e5fa955244801af31e833053376e747ab6
SHA512a51edd60135b17748d6f95ee2bb05a556a83d5f1010d88afe1b5ce012b652a92d9c3db7343969791c73c9e42020efb128c315bad90d872101d05bfa059c87b29
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b