Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:51
Static task
static1
Behavioral task
behavioral1
Sample
eab3f04fb4582be4b0126e67ae7a8a53_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eab3f04fb4582be4b0126e67ae7a8a53_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab3f04fb4582be4b0126e67ae7a8a53_JaffaCakes118.html
-
Size
6KB
-
MD5
eab3f04fb4582be4b0126e67ae7a8a53
-
SHA1
bc3ceae0f0e57acf4857f13ceaf0f99a0c9cdd0b
-
SHA256
4394f78d5734cff69e9ad0dbe84d87496f28f9832b86498de0b75ac336cd79e0
-
SHA512
46f9336d90a6842814d7f618f09dff9cdd01cbc64b0675d214ef4a4a06127ec7688bdc07f3f30899ef939a1d39ae2ddfb2c69042df8a846d387447486a24243d
-
SSDEEP
96:uzVs+ux7zKlLLY1k9o84d12ef7CSTUGZcEZ7ru7f:csz7zKlAYS/Vb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886940" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d69d02580adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b9e9608a0345eb15a3ce32807f002d52d84d442a2c639a96993fbc9a297a3dc2000000000e80000000020000200000002e09d796cab31c77ea566e0be18e298b911254983a006fa03e0bb8aac36289f4200000003256d492afbb29f8904f33a6b15abfb4cb5ce8f10561909430bc45e94a826d16400000001a094a9309d87f6629da427d9b70a3072c5ec93cb8da8b623bf2773731bf2f427cd173e87d38e2f8dd4ba86b8def81c23a1117b472341258577a814b26456a3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DB06B41-764B-11EF-9816-E6BB832D1259} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2288 1656 iexplore.exe 30 PID 1656 wrote to memory of 2288 1656 iexplore.exe 30 PID 1656 wrote to memory of 2288 1656 iexplore.exe 30 PID 1656 wrote to memory of 2288 1656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab3f04fb4582be4b0126e67ae7a8a53_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712d3bf0124dec17075bce1e5183cfbd
SHA1f12db22895dc9d7ae53bddd52f21883624479eb0
SHA25615940f04fab2a1aa190581074829797f06993fb69846ff33c6a2408fa26c963d
SHA5123d7a8ef8a01fe409d159927781092897f519ca6a503ae8140ea795cefc53a00274e8f7235ae91f6fca9eb470c1db26310f63f1f0c0db664e464be9a2987b34be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ea220aaab3df5cdaa7de11cdee0296
SHA13653e6751a34f1a28ec1195b5de4f8d97645f767
SHA256b1a0c4be7675599dd4a1c0b8558372408396c22eef4ff3912c722b1df706160f
SHA512bca053234bb8d96d6349e559072223cbe0cfc1fc06926b6c21102df54d87a57eade05f2862a2aee206c3e2b20cd15ae64f63377832466ac45631076c1326cf62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b6fc4b9aa72386288659cc957ab4ff9
SHA16209863e76a34c74812050644b9f91bd0d75c2e5
SHA2560447df16ebe8dcd45abd0f87feb5975426d5c8ace9a5c603da739e72fab8952b
SHA512b14393b3ad4f1bf07ece6c52104dfeca0f72407135403c42bda67df6b94be9c731f330bf45fbc4397476f8c89a6bc51823b6f21aba6246cf0c270b2efdd7bbe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a6a170a09bc4fd3b0b0d999c3a2e409
SHA14bf4f714168186f8735e401d6a1c464f08bfc13d
SHA25665cbb882f00e8e7ec1576799d87f94a0c61368bcd8fc8a1fa39c3d7e709afd1b
SHA512992b7e7b1a51976f5c9c752a884ef4112346841e0eb9303512678604f5cb69a7f4d3f89b36879161da12e8710af89ef8b3111385641ef10a0d77a9c351ac40b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10d566d5aeb33935d0735274816606b
SHA10ddba685955e8f1d009f8f46e801eec302fd96ca
SHA2562181095b1551be43a5cc135a58c7bae31fce2dee27d346dd720b585769ca7852
SHA5127f3450b1db7e73c3cdfc11e114a57b4c0a34d9589ecbbb942242d1b85a779ba0fccf5065e00c2f28a810c3e448cc7ef86f6946ada70301e4a2ebdd1f9802a3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb76ebd80a7b6be84212106e0cf98bc
SHA1819669ed4407a5aaaafa07ee65a025736c9d008a
SHA25601f84b74a740d4a7284108a5d2a0e6b50b6ff157c203bfeb466421f1c73ea72e
SHA5126537ca8c9475299c49f44896f800eaa7c864f93d2c1defdc9d1a56131ec1b33196ac9e3cb49b925ecf96887b14fc75337d1672015cec7f39534f6b066c08c2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5002ae07f8c92221e5d000b1d61fa4647
SHA14255e6418521b0eb8e6a0c165307e78eaff6b67e
SHA256bbd3b01b3881396c9789d2ed5d2d140d63d1ffae38d3a4dc7cefb6df5391a6c1
SHA51279cd73cad548b28a2201fd6293fb9e76c6b0910b7cab85ddfd954f498aec8eb088e487856f5efde83c5201a57c825d6bde5d6b2d383018d3a29a54575bd1f0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0cdcfd29e2c5c8f1f22f8e6db46091d
SHA1a187908ddada20f47717c37a89ab00baa9846387
SHA2560d195221d92c1efe63b493b4643b482748553905a07a9c86c9953de0d54cbcea
SHA51208728ff2ee2a09d39decb180998c8ff45bb137d8d728c19a9ea2310ca690062039fbc5e25d0bf5dcb62f95b27b0349f676441e68534d8670d7558682b72f60df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f5a4817cb6e0961e5653b7e00e2220
SHA15815821330dd5f9b9c1066a3a09add0678eabef4
SHA2566675d2321fbc330c922c5ed30eca7ef2fcdf5a29965b177d7af91c52fc27e913
SHA512e2c63cd8b41f32000ae344b8449630fead9ea4ec0079ed3bc4db43ddda22baba325d1aa241605659e925267038dcf88e02354ffedf8fcd7725506aa03ea9a7df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72bfa300b7dcd8c91d6373b0e3f4adf
SHA1fd39cc8fc3527b3de83f7126bb95f6d815cb2652
SHA256ec82949189064d9e68a702d943d390865f4355a2d3731d018dc22b3dbd7cc2d3
SHA512b331354fd23782aca15c31bc73a7aa67ed780e1447c04771a3577e3c9d371b62a5a900d5078fa6c39d2cf00774b4924a45742fc2bed7ea46bb1ddf7469478190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70c9bd96766fc5d3b8bf412b48a3d39
SHA1bb6f33a3830da4f9bdb39a27b37d8b878cdd4304
SHA256b1ea08c811eda9cf486717ee32f7e6d4383073bdcb40c3ea7c8d9563e6cfb054
SHA51268079127873d01c8e1e4bb2a9d291792b44417cde436d5f05e269ae80e425ac39ce14d01e0b5c2105004c4d176e70805b231c22da0cdeb20bd28620cdf619cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f492e366515b0891c600e71daf14e9
SHA16fbb4f40f321396f50ad7483564419522d390881
SHA25601eb52574f3603c8251c6934605553daa17f1b86b693957695099620157caf68
SHA5120a0bcadf2cec007c5e497921d435c4b5c993f795c08943ccfe66d2508d9e46f52e4d507083fc2538b6d86217a6c5635d7154101c5eb71eb0971b171030ceba76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5636784766841c548da3d0261636c1114
SHA1ef3d65d4f780e831f4ebe736cc8791d378071577
SHA256b8b80e807f6bbfacb11e92b3ca770746236be6dc41f7496dd8665528850fd57d
SHA512e95342f374b6905fe0cc0ad5e6bc9dd5c206f59a957172fb97cfd58a037c7e582df330428440b6250027c1c4d13574e709b8ae1c88597fd673ada8095da099c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9a50f4029cce93a0fee116cd901202
SHA131047c7bc601e1be55c19096852af65ce8e95274
SHA25685335bdb64800fd42db7bea1cadd3be4b86468ab9b93a91beb3b537284ffcf12
SHA5120d737e16d11f84be4eab2b0e77888cef961f8f41d6d4fdec64b28fc62c7ccb285a56e9d6dda83758d6e64f5228038e277c96d5619bafbfe06bab92071f0b38fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a763acd8fe0a6c9591b3ec5ca49639f
SHA15f43267fd2658dab605f06c3a958201ca39e9e62
SHA256099374e18c54229f8b26e59fb50841c97395e95bf9bb18ddee117b55e413c981
SHA51237b695c94c380809c60c35eaf10ff39431ab0f9f088f1099904c1d0b17486c521889d383a7a9e641930d7a33a06d29b8b768ce17521f135ebfa65096f814f3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6eeef4fc6c9268b0e4c4b29e5ebbc0c
SHA19e207b33821b79c0478268d18f3dca9af5fe56e0
SHA256206fc8038df724428ae0ca3bbb00a3cfc831eb0084ae72969ea57f3aa3e18c08
SHA512771fcf94ac653c45949a5f4dc1a32ab3f11388ba44a74d9d0f53e53b714babe21caad55752b8af7f5924e913262920ca9df8b1de7a14d1a3a391ce90fbe59b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811c1526813696a5eef14cc52800ab6f
SHA1ffcc27bc7db78b2464f80414f4eff6ac74a0c3d5
SHA256f60351b39f375fc40f5901fb698a55d5572ee9b191be180296b241feb0e78053
SHA512a29c0fe192137752a4f789c3578a847cd1111e65a18eafed997faec9b39b71ae00c3522ab6377517f5eab56fff30e6b05f5e2dc3040161d1fb03e34dcc900aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54706e9c486efe1640602e97ca3654f8e
SHA1ed24d8581f73660568cb0498dec216b68e021876
SHA256c92b4ea69b0ece49ae1a7409067584f2f2c9447d8b7ac781f3c7afa62ad449d5
SHA5126a6501622b82e4583faac38b4acfce9b552270ac8b8b5bf34b18d4ed272d79f55cab9df1ba7bad00fd49b8351a984eef0cf216c613de6673bcebd49bbe0cd87a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b