Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
eab321e36d72ea529100bd1326fd07ab_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eab321e36d72ea529100bd1326fd07ab_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab321e36d72ea529100bd1326fd07ab_JaffaCakes118.html
-
Size
18KB
-
MD5
eab321e36d72ea529100bd1326fd07ab
-
SHA1
8e1c430aa721622d72964b5a2d991c6ca8d5cb7c
-
SHA256
bc92de795890e6860f129f417a2b606ed24c090d28a1876a842146f991545f7b
-
SHA512
3ede98bab525585b255aaa3225825988c9bf0e71a20a681b6e0d33979dea700853c36a774061ff148a0555cbbe6363daa64b451fb33f7f3e438059772d7b27cd
-
SSDEEP
192:CeZuPLZOClWlA1D0RNSnLV4VdXAnQAgwNwN:CGuPTOA1D0R4nL7bgwaN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ef047edcdfe23bc4010f594b1d5469dafe7cd387a2c3a0329616eb8b0e8c948d000000000e8000000002000020000000e77b6fd80a4de789544a244a8ba1c453b1d92c976eee6bc963bed8d6d809ff31200000001044b367b8f695b92a448400288c68dbd19bf3b796d4b54f0bc560ed5ba61e6940000000e562671bec769c8dc4fba36f167120469b72a88807ce7675cdd477533e9640590ed697d8d6daa3ac730a4543f86013fa1872fbcb8b86eeba43dcf35ff5afde78 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886779" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD445E11-764A-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c980ae570adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31 PID 3032 wrote to memory of 1568 3032 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab321e36d72ea529100bd1326fd07ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54181054bae061c02df73c27ce2b48418
SHA172a655a96134c16de949ba366374f6f7ddf0b9ff
SHA256af13fa34cd1bef2147ee5df598eed68535303a4934fbe9913c244ec8d39c0c26
SHA51281d533e0e0a502b3bad9542f384428c72a4e408254b3710a5128d888603e510aa8042f6664d74692621caaf3a8c1e3d2f61a5b18664db539fc579f2625ed5d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea2e00846267323373149733f925cb5f
SHA1e670866017813ee4b6f64668fa0529f2e0644ac2
SHA256710664a044520b29d7986e664829447920eb2678c2a1a5b35d04d262f0e2a2d1
SHA51293ce00a076935f42f22f54ffccdb4f970b789ed81629e9908cabf69607fb1b17b54394a17ec87a26e31ad52b67e87e81d79687fbd9474f0179e10955c2064123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5357b8c42e143c6bd2220006d1cb18b06
SHA1789665e6e17c0c697c914582d82815b0e840cd39
SHA256644014020086e882f493e5d526f6ea485ac4d0d5d0df6b6413e2b267c7f6728c
SHA51265b05d676eca5ec79e1c2eaf033797651cbc98cea5ee8369c5d521656de4c17ddd69ac7018bb268cc8d7a31c4f44d691cda279964b4c1f54ac01c03987f159f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22eeaa8dd305181f5f8f49f15bfd620
SHA12caf4e473729d0fa2a8e3264bc4aed8cec880a6f
SHA2567036d870fc8dd0f4a6122172ff3e0809d40bd823016d39efb186749a769c4d60
SHA512f0f65e1be7c051cd997f9a8bf8f0a303fe2eedee75c6206088d66b906f675ce7ae342267f6ad1130ed183a277ac0f3e0f710087a284d8a216e8d7184eb122d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b365dcf79855410cce919676bb09bd8
SHA1d5df6603c499c531d6539f3d0c8f6dd79f6fe6af
SHA2561f1d71e95bd280b7b35885151ba132c103561c33472cdefff2200c966831dfea
SHA51290948808fe44cd4b00782a114e60100d3d05112f4ee4538a4c160a822d829c68ec48334dcc43e38916fbb752ddf58341918de3d18c5246f88018c4ef9af035b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482ff644e4286c2a441854d18ed9d5b4
SHA19cfbb3bbc4e0effc840cf9716817bc4b0305584f
SHA25686dfb7db9f43ac2163dc52965fc8a2c4f3b0abbff6e88f6cb4d476e9afa09179
SHA512a05d707c1d102acc930b53747ca18f08af1978bbfc9760c06e98552ead28780a1361d204c105beb4ad242febf8c2f3715a137c6b83981de3b23c996065117c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5cd6c46c12c22a2bf968ba874cc4eff
SHA1c9ddf8f1741583741bf0ca0b7e7b87a64cd3afdf
SHA25651d1a8e3b7a5f9cbae593b79e861932057bc3ca8e792c8ff84cd41029e9ee2d3
SHA512e6adf6fbd20fffe1566f5b297fe94be8516cab29e342dd476dd34486d7cb6a7444e97fa7ad3e0307308a7358f6adb893904c73766746340226c5f69f5cac82f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1c7d61ac99979cc272c312473f3503
SHA184a13070da01e1508cf07f97b33006a93f79b55a
SHA256f2f578d4d9ec034e4a360573ce89ad33e6f0cba9f11f88891f14a971137ce398
SHA51263b64dcb12d9a0e54861254b4e17da09a1bd2d3ab351814fd2878b715d4a0ecb055cdd08dd85fe291b1c1be633d2c456fe7dd575672635efa965a3f2cfbc8adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779e4029c70ed06ffc9ee34b9539e531
SHA19c491f16c8b4ce17347f5f9d2a4e8aa153c98ef8
SHA256a3765ca9dfae7e6add3d3ee2076667a7256ba3a6b42f5de1009812c695c033ef
SHA512d2be0cdbde4426e8b9b6f1abab737704fa10d6072c9639abee52da2cabfa44ed06d7b81414e3a1c9c907a00c142d341a7f829ce3e9e532f4c0090aeba8849bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573ef047fe1115742b63d95189f52d3b7
SHA19b2c01b52895d4357d0849ca6ca3d6e34be111cc
SHA256f5b51131f085776a47ba29401945e3f392d0b68cec8b4cbb1afa2a70975d5fac
SHA51285ffe9fcca84c462688f8ce2dad3254a38c13436ef270690cb6c1a0b42472474d9c1c4bdc6b942a254c7a8fc43278288434986697840d4a87226a10b8edbab4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc681993a126d6a49560d5ec51613717
SHA112eccb3c13c5f4eae14fdd181ae8f14b284d2d85
SHA2563897161585996ed27412753c392f8471a1816c0a9d4e133ea039ed51edcb21b3
SHA512b8c4357b7cd8e7fbe0b4637d774d322c6aeb88698c7cee22f318a59761e1e011142ceb62bb49a7db1076b4ce3d89cffe7ae56c3b9d8655f6f65d333bf5425b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eacc56574579d6ecb642b79dd4d5a03
SHA1c413ebec37a7179f3c365beef6043481d3707c75
SHA256424f400d0a49fd87c00cfd050b63440ae88a21784440dcf49591d7edded27b42
SHA5125e1c19c7a54dc742c85e5c5f1ff4b63beccc5972397b2476b1b93a9dc5fcfcdf5a68ffb9abbb3fcf967b55065c1635f237cea9277fbfb602eea7344539d7dc98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c90c5e6bc65aa4f889c1d308d6cb6c7
SHA1642a3ab0b4895908526c3b73454db60b518e9fa1
SHA2563181306b8b809115fd793d9aa4b47007bfbeecd6f2dd4957fa4ae9c38260abff
SHA512204023ab874af18f58d4cfa9191f5e8142d8098314c3aa9821ecbf735f7c04629bf008e7d4c720fbea932e03ba3894920cc9bb2d34598f8b7459ea6e1801d07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af25d18b76df193d40ecca42b693db3
SHA1e1820cb5897cbfeb88833685e6121d072c2557dc
SHA256aafc047b34d8ea894cccca80ff4a9c17a3853f74ebfc181e58ab008dcad4cbad
SHA5127ae032b24120089e0161ce9a73e320a55e3499aa090bccac98bde733d86b0214881ddde0446fb32c3e23400d13e96b4476ab02b4ac941c1add7838b2baa3c53f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864fd7ef45224eefdda4af3dc50491a5
SHA100c6ab46cc40ee2dc49bb1bd562a86b0a014e58f
SHA256033c27c6f835658ac33442dbd7f5429fc62e08198b2de2b9ed84ccf5e807bd1e
SHA512af09bab07101206cb4d2d21b254762bd9e446c271a1c71048625ccc1ac31f070d36988b64753758953815834119aa0f880157d730a7dd562fb5cef9a57b1d33a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3b0328539e37325a8747d2d62c4c0da
SHA12e2fc53fb36b26489cfe5b913bce66901454bd42
SHA2560131ed505c80fe814aa49bc08d2dfc9a8e9c587e7f9b1d5ad185149ff2620d54
SHA5128bf592a6d44d7097b97b372a1a54234880c7960f03c9924c4a8b0463872790d6aef2cba08975d0731f29800b91f2bfaf8847d51f23be7d87facade2298c95e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528caf2756edcf870660e8ac107328503
SHA16f2779d61d5195d43fc3725c72000c2dbf3d23c7
SHA2567b098b276c999820e8f247c7c2076dc46cddc509d5b92fd9cdd10ff3d54ab0ef
SHA51227974563e211f4b15c54e5b502a945f8597a7eaadb1561653539e36d576b4a250554868f2d053fd9b57cbb8881529a7471fe42e540f0a1f64ca3ad9fc77fc9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576942b2ea3eeba9d4eaa839afb7969a4
SHA18311153be8d5b0f6e5fe7c6fc512af04ff912fd4
SHA256fa48101a6c6772a8791e11c62188b0636602d84fd391141e251bd9972903efe7
SHA51258bef20cf84471aed46a06e1ba80f53c547db7055917d43132677d7070ce20a75dad0116e4b9593a1ff170315ac1dc7d42b8035f4fcfae813aeb558983ffb613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0cf64a99aa4a9a77993c2b560c9e19
SHA15bae85101e35d37628b9b12681c24d3cc787102c
SHA256ccfc93fb1e07e878f5dafb679b3dd343b1e542eb9a39f9a7adf0b7bafb4e48c5
SHA5127259b3b05c0b15498a1de2d4ffb64325480be49e70e5aaaccee8c394d5bfe42e556c93498e4f47649f1ec6ab3358d047dd26ac67a5207c18b5d393eee2628dd4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b