Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
eab2797d383a1e63b88126555d5a0ff1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab2797d383a1e63b88126555d5a0ff1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab2797d383a1e63b88126555d5a0ff1_JaffaCakes118.html
-
Size
27KB
-
MD5
eab2797d383a1e63b88126555d5a0ff1
-
SHA1
bf96e7550d4ecbcb98b7eab8becfc56205838971
-
SHA256
0b54a6cca56597915c209c291a31c7e886fc77a1d7db512a57f26819ecd3e7cf
-
SHA512
84cd1f6afd2405d04a81aad5e6524e1cfce34901ef3cde1fee2db95f0d641532d50640fa161e243bb30399dc1d2246017c301b2a1e5d0a65ae491709ec7ca058
-
SSDEEP
768:eXUNPGbceaC+h9HeVc3umn41orbmsqQuBOcbwh2x2bPTbYXnIjIF7I27:eXgP79C+h9HeVc3xn41QSOYVd2bPTbYJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886653" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000005ab4bc7dc16707aa5859a57546980600e386011704c62da12921b2c7c73f0a21000000000e8000000002000020000000335b0d5054a0d6e112440e7230e7ed51657c3985b6646b325435360ed4e552c220000000cf2ab173af5910d4e39ebb4240769a793d1e0c630714ba48f48fafc8be58578e4000000045fd86bb5089edc5382c64e625a5819909078d9e5c64184659bd4206a6ad4d03fecf8db2d980449b925f6356e2206f4cbfe2bc4bae8591b4a3c9b8afb7f05612 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82A40EF1-764A-11EF-B686-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d02e57570adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 880 iexplore.exe 880 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 880 wrote to memory of 2780 880 iexplore.exe 30 PID 880 wrote to memory of 2780 880 iexplore.exe 30 PID 880 wrote to memory of 2780 880 iexplore.exe 30 PID 880 wrote to memory of 2780 880 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab2797d383a1e63b88126555d5a0ff1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c242f9110a4f19f6cadd4a459ae7da
SHA14b994cb9f8cdb5faa07e18ca038df5312dfe7833
SHA2569406fe608681dba5a72424845006334cc4f40ea35e3dff17132bfbda20a077be
SHA512d868666360e3c3682bb8318325e981bbe859a11b061443a022f15393df1f35670a2029a7c12eb0c1dcb962a8e177748ced11956fe9207cc88196c233ace7d4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce61f52eea3018d7f1cb321bcd470e4
SHA153d42c359c03af3d1fdb964c1d2c5749c80edd4a
SHA25616450a06ccd80ca70b37497ec5e514d151bd17b8739830b0395468cdc85edee5
SHA512ef2f922a52e4b48e7deb1655e52f502a85a152bb529f6a82037fb049cc9e2c7c2d7a9bad8efbd9ae8426e51a08321abcb6932106deb228a45a36027e41be9dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560646f69866af8cdec932ffc8bf1173f
SHA16dc3e2169db6a7123d85cd7463658c6d77e95760
SHA2564598869c3214e62eacab4ea1c3bf21ba9813388fc2a4885bba76d7a389a3731b
SHA512f4bade7fbf1b9e69980b0376d258ad86439eeb71a4fc89688968b83dc37e740e82e3cddb917302858a42a46aed7d5d1b851611a81a75d7c2d27155e3f414c2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29d3eb927ef6fa2d1a2edb06fd33f6d
SHA14b029f57d89253561abf2c3ec28c2b289117e665
SHA2569b8a8cffaff31934b488f12bff4a4b5ab7ffd62daf5a8a85c1ec041be86dabc2
SHA512db2e85d09994ba538c60cca1c9e85347fb2e021ec02b9e3fd7a55af40a33afbba0ae79117076f3d736240696fc6194fd88e4b00a21d7159922e6e582e6921a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fde7959d6cd883c8c8e49cf7a7b35f3
SHA1128acdffe9f51258c1f828f847c0295c3f647370
SHA2565231bf9aad2676943c25c5501b8acae1c1e08ee8b99e787aa2c0dfdffec3c664
SHA5123fc5695de5939b1b86d0387d9da54d03472cae4794c9dd1a14983ddf9d45481de027848f4e7943d40fc9e7b40d5ba18b9c50e41c795def61ae04f9a2a0ed3433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52904a351d609046f4351e94255e3fa92
SHA14f66e9cba221fc4bf4ac875539f9bd73e5583c6b
SHA256f0ef540f6d90f3c9d0c61804307afe1ff8b2e59b6f8cc015b3fd30bd0dc7c038
SHA512131229405a50123e0792d3c3b0e06a2d7532a1279ad3e8d841be1ba36e7858d5db9e4b718ce5f4e8619438a26cbe0510b26dc2edeb6e03ea86b2d31976596df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9267f8f61661fe8be682054826a59ae
SHA11e13686a0a9b205dbe533db640e40ab0fe2c69bc
SHA256c686a3db65babe8d83b599efda5baf53b3c0970914a296785cc91b44646e3bb7
SHA51268f1f94c3d9d818427f0998054e7de738df7d4a73734453b9fd494757d76de5837cc2e18321e060a8dad0e04fe259a1e1b281f76cc0e2b582b74cecc31f63723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279eb7ecc72329e00bdac75a6d02db64
SHA1e2a2073b8e6b61c035e973903708854aafab7e7a
SHA25644613986843fc2eb148fc9c2ecfcea1b3aeb3fd8301ef45aff9f313a8367206f
SHA512d9cca67103bded0fc16458a927d7fcea45b2c5aecf57f4d05feb4c15d6a97c792251cb492dff89ec6344f54cabcb41078133ff3688ac2c546246afd20c7e3583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599aa3ee7d820c688baaa1785b670590d
SHA1aedc7fa8736d8c1d71c3fef758aa2b0d967e2685
SHA2567d580751640ca59a8da9f2938455be48253db3710fe497fe7ca4c4ed8fb5eaea
SHA512dc6eecf02d8037147a809c3d8389d2568feb70ada5e0648bcf73645434d7ec101f298bc68875cd345945d812ff91310285db9930894bad55f078dd73dbfad6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9b76ef3ddfdc9497fcbdcf68e9a418
SHA103e654150182320fd5d6ea2a6f3dff1a5ff12da3
SHA256fa5e758979ddc4423b9e561dee0b24d124cb4a6345fa20228da3d6991bf689c9
SHA512f87ea9181357ccc087d0bef684a1e1ec521da3375002d73be96db419b7b22df9dbfb6202bb79bd247a1045a2807a4729576c68a11f7ee547b3c2f638524ad968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6080f4bae71207e7958d7cbd4f4055
SHA16c0a25d2aa11555e00052c2a9791d8a9f0cf001d
SHA256d07838895b32cbe8f45e0bc3fb8fef90b1b23b457999781f94bf046e0a4e5147
SHA5125d06a4c720e65934c3319197bb270d0c4be7bbad553166ecf2a0612df2583bb6b5c86fa4c2688e2ae7b5bf78785178bd4bddc7c16319729e6b6ba0a139b5275f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504e944cf887fb0fbc196aeaaa23e318
SHA17a23d4ead95c758b7ace03be1fcc0d948bf80125
SHA25627b8fc9f42d393f9b47be34d6e11b0512f25940cc3df287dccd9633c54f18be7
SHA512fcd2a70c62ed8b55f2ae37ba1e6a4d4a4affed393613e2e482b1bbd3ab7248738b711fc81a434dc4e922dd0d3b2e02b0cacdf74cf74050a6a65b0b41c89771ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7affe8b73fac2e9504734f12d867aec
SHA13902baf1c4b0d59cc12eab6b329db3b4a88e55ff
SHA256e9593f13e9e29eceea7894eb64b0fcb0cb0038e081b2da7c3e370dbcfd57b885
SHA512c9a3e5c679c80da96d3124f2329668431fdea59c7fbebdd51f909dbf840bc564bbaae98a466f90f0624429cfbdcd5d3f1dc51e5bc62c7e8830f1c72865c56649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb08f178eda13d205ddf7721db5df7bb
SHA167142ec5dcdc4f98ec86f8c1d92681ad1211e205
SHA256308957d5d262964e91c9c137279a417a02008dec64a299aab6edcbcd37214a95
SHA51216b6aaaabbde8ecd2af48ccda1007222866a7325ed15486ae23a127ea3b65c7d43d6ee9ff23cf7a4168631aa333f87ea520c66e178440e76e9837f2ef28e002f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5314ffd0df9e770234871ecc349dbca
SHA1fb127cd7109894183bbe66a7dd22b07a57b808b0
SHA256437d358a2c8a96f0f2bce50b3d5298933bc54723d4804d397434ed0817a6e9ab
SHA512c9a34f440e22acc87b75b9c992aa581d3c33adfef2bec7f1a75737858d66aa9ac5fb0cf33a96174a0539b2d99a68f6366b143731c2a784af08ece298f4bcc104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7f693d8296a481b0830198e8c991d83
SHA12c99259ada4bdf1d95d26ed0a9a9370902681014
SHA2567c6d59e1175092edfe6759414bc17f905336373ac12d3026cf6388df5162cdec
SHA51216335fd7e8d2dcec6a577fe2a1648431dc7e1a6e2a4699d6d11b0e0588f1890cc9f5ae82daa7314abe9172aae92c6dec9617ab632ac0bd529d738b2767216273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bdff1ec948502c2e189890af132ea86
SHA19a172deb3972228474082ffab9ab845e2b722d76
SHA2563a621a9de193fe288db127061cc8c754dc4f5c865a9a6fcfaa9cb32557de3476
SHA512191c6a15383998aeea031e6898b2b7f5372e9e87dd430de11ed3ef999781fd3bc6269d5880277f23b25d34295ebdac5074d327d4072f3a41f0e7a3e43abdb322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53258d1d611be5fa93e1c010701c3571f
SHA175f9e83606c90ff8bf0a0db2eea082c6ae472700
SHA2569efb3ba3fadbead98b78e3a26e1ebc22695ddaf7755b959490d8ccc178343b42
SHA512b240e0d4acf631badc911347eabb7f798c3d4819714596df330ee431c3c15aeda901fbb785ed2911b6993c7f1fc46da5d6791d7dc025d6d988a5dff09f1f1245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c07a90245822a89d1983b6b3e2d74a7
SHA106c6fc6af5af1c81b5b4d36268b551bc9e7b9fce
SHA256d84a86bde9508a1311767e339bcfdb04a21e4add3e8bae31371f1ba442a7441e
SHA512bf8983f77e4bfd8ff21adf6fe7bd6c2b418f7a3017c82effecda6957692633f3dc2372f7b305f76318111d36d2b9758ea0d0c2bbbbfb6f8b1810155c7cbeba94
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b