Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:51
Static task
static1
Behavioral task
behavioral1
Sample
eab41cfd9801d916e2e80d77469dc362_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eab41cfd9801d916e2e80d77469dc362_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab41cfd9801d916e2e80d77469dc362_JaffaCakes118.html
-
Size
2KB
-
MD5
eab41cfd9801d916e2e80d77469dc362
-
SHA1
f1d85b64c2a2604f208a64b585b772d00ca8433a
-
SHA256
2e85eec144cca12bd9a084bf00ce77c3c6a1b09b95c389577d9732d4254d294d
-
SHA512
d44067acad3250d0566cfe036ffc5e1eae8590f8aa91bd338dd34570790999a1549da284923133b5d064e263f25f7ad1f34de6416afc5a6503d227c5947eaac5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109f690c580adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886958" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37D27191-764B-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000007478cb040b407ede46efd5a25513cb5109862d2c050a352f73408f8e1a4960fe000000000e800000000200002000000033ceeaa14bdc7e8d2249caa40130a05679cb3a45ee711c6639159bea621bd9752000000011ebb47d5d90a91d1d508bead3bbf524ab9068db7b0838a87ac15445042b748d4000000034916139322e69aaee8aa25261194710032577e4d00c3d26335196a60ec8d7473b3fb5ef67d76cdca7cb17b1e6405e02fd66f034c7d6e9cd611c4e69749343b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2400 1704 iexplore.exe 30 PID 1704 wrote to memory of 2400 1704 iexplore.exe 30 PID 1704 wrote to memory of 2400 1704 iexplore.exe 30 PID 1704 wrote to memory of 2400 1704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab41cfd9801d916e2e80d77469dc362_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f549c8a6e40ec24030d8f2d572c13c63
SHA1edbc38da1613b4abd00675ef44755b74414335a8
SHA2566944bfdec7f96ae59b8a2f21cf44d5cdbce55e2f658932dce1781250cca1f737
SHA51275f31a7bad0cc83a3e329694c8b3ad8305139df410596b8d4d9dbf855a7500a027d7751a5d84a1015468db548b147312d87feb6e1781ea180137191a9efbec5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd09b1bc96af7b89769a788eaa2691cd
SHA1c4d9996398a195d307732806659736796af636d0
SHA25675a5bc4fb1b6eb2ea2c9ecdef293c09b95888b6539b4ff2880bcb96ac12718ea
SHA512b971860cff46ddc04a6658409162dc802a30fbac498da9ce611c37f2329e045e15ec9af6efd81523f71d3946d8e4b9e0d966a010be7f5f78d51680c6a2b80f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a443d4c6d2d775e6b1d9499da498679
SHA1863312dd1157272f67cbd60b84a37b260f5ae6f3
SHA2568c4a5e07fa143c6e9f5a577e30ba25d946e5080f0a793f6544db4ae2df9afed0
SHA51267072aff422211aa3cc98aea72e8eb76c8d490a912cb17f35502e069a67ec56891f58a67a0a76051291f2d75e25678aa6f60c1ee53d791ba5b738c6a552580ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e631f9a8e0fdce0aa2ce4fedea3fa09
SHA1530a17f36b215267a378ff2184198b2fcff44c6d
SHA2561506283582cd5110978d5df47d26aacbacea98669ff96a7ad6b837e6b1c92b6b
SHA512e2e98084faec5dcd4dcaea7369a5e8f9bfe3c41b43b37d67ae2c975d1f5835911b1dd1fb65bbc96e0a67ee62c46b59d37346e2af15b5a9eb77048cd2c23a7e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57451c405824e6c230fecfab08df09fe7
SHA10702e1bd90bfd6ff70f6d14c394c18b3a9744c9d
SHA2569ef9b2cc91aeb50190ffe1fa63eab261b83ddcc616c1383fe37c34ae5f95b6df
SHA512ec31a87a6b956b94154d4472e96c7df22600ffd0c42f0bfa2921ae0fd395406d42844d488c60aded4b85e56652860f93d76d276c91140a4cc65ffb40a13eda5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5842ed06dc5660cb22e5696abed2720af
SHA1c496c14a21548c6e74dc200befcc13779b3f5400
SHA25650e8cd69643424852a89af0c3992cbfa097b6be436117e64623528c48da1b678
SHA512651b583f296e56dce31471b9bb21b284e54c7bc3fade087734f9e1a9fc95842eb6cf807e7794402ff7c0890d44a76c58189a2103a0fded6d35706548705f1eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540f8d96aa70aaa14ddd9575c99f6eac
SHA104faf06459b649985f817462223f6e5714aa5609
SHA256489647ee5696061d88830cf7d07ce4cf5795bb25c75ec0b39388526c4b224f7e
SHA512efea904304c69b7c4dbd86195158767550a7d96f7cf8baf8cdc8e3ed43fb596d86ae64511e397ef244cf8ba3cc8820183a2fa33997890cd6edb06c68b26eece4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579df4acc9b752c2c4cee69218d1771ae
SHA129be15628d2a50ba56e2bab79c4bc91847371a35
SHA256a383f12f7a67dd9c3b05f37394002ac2a4c428022bbdc045240b53238fe7d16b
SHA512e627594579b400a3b3e9356572fcdf718eb67e0da9b7a939388d24df5e851e1905599392ef7d72eba1a44ecdfae638ffe1e0760018a9f19f2ede862af0e7951e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc2439881e0ac82540b28e35fe64072
SHA1000d5acd3f2b436e3a3957db8bf52f1ebe8598fe
SHA25633134a2a3db4e15bd0f34a585d77991c1fbb5fbe94df65674e57196ce8a46a99
SHA512db763ea168f617e70898368751ab9e719332289f10d132b892a8191724ebd0847835cc0d1fa4e644f60129c8e115826553f5fe75e4fb051c48685d2d5eb4027d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589ea6c3079232a8816d53e1b2e93aec
SHA1eb6ffaafd47e2f8491788925f4d9faaea70cc944
SHA256c32969305753593e09aaad6ea5cba316f7116aff1d4f601ebc29d59fcd1823bf
SHA512a30205736b6a8db77fa394b6c217cc357fe0c6ac9a91c4f8c312c8d6cbc424d285e5ad55e93107d082f8e484f51193ae9db3f31a7fc81266a27b6543edc11278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50197a79640bf7647de07e3ccaa244f75
SHA15dd302114a1053f85b195e82d68af95d667cb192
SHA256d8f539b2b2d1a6c49c7892a178d13dcf965ce56925d5055a0c33c9bd9398b83b
SHA51217a83b4c951cc1367cf9fa1d7287481284b9939148b9cc7cf912d0f7fb10aee5d9821e6b6d222145a73d8cd133a0749f863ca354353197d71195ccec27248d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c0bb60ef1ae9340ebf22421a03eaf11
SHA16e285afa37270bf6f57b3557f6721ba549da9e9e
SHA2564b93e3599d1ac52f774e81e4eac8cae8cba5e7ae52b28d14f9f5413ea17117ea
SHA512fdbd12d49d6cc6fca37c386d7c67bd1fede0ae82471ae3dceb4574e461d3c3076dd7e8ce2a2eb9b58677cb0b9f9fbfad0e9b1b7eb4055ab51c1f4b06401bff06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76d0ba96974f039c981022fc474f938
SHA1924fcb3e60e7d25762104e0e1679001d40942af0
SHA256de5651a736a721ead90b80677f143d1c444607cde0784ab780045c345f565c4e
SHA512b22d52cb9353c5d9568d92319dd88b9e9a569201fa2d497c9a425879f60337a6feb4ac47d979e68052bc670536fb96a1645e62a06b039f82923f0a7b7a57edf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54970a63f896d02ecdd04412980cb0747
SHA1b515d50024bed01f63e74eadd5c900018c1bca10
SHA256a7f5cefb440b6b301382efd7811c599aa04e603496927ff8219e8ed449d70e07
SHA51248eed26ed7db3cc29ecc4df5210531875707dfdbd653adacfdf0f244af826d2b24f2328d491520ffd7cb7fcccc6f1edd060010ed85ebf36e13297d6b32beb98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc893435e6655cd5117f973a0b4b48d
SHA12d8b97bbdd57614041741388e744097c7f3dbfd6
SHA256b36d25ac2248fb30e6ab8cfd0c493a0a8d6748d2826be275832d7c0023b62a07
SHA512e49a23278f22ee400f101f0c4969c19ad31c0e8579f6ef6dc43a7fb1258403bd680326be6f89c28762e378eb607504f6e43472cb8d1883cf8d0d36bdf7c81b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0d3bf4d0c0e34a1bc923f2e85aec7b
SHA1d8db0c8bb692634edf21a8d821ab80d7cd68215a
SHA256109915100863587c0256fba54700089ce678f60f970d750fa223e7a3823d012c
SHA512a910b4c3e076aa3dec7ac8bdc47c12ba5ffd399e671b4a13d2b10596adba9c1c2d023bda5ae9f54c3117de274ed718f0cc143ed9ff9e398ac6753b9e295e5808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cb38cf356669d304481ab2e2b8c822
SHA1fcc6dcf3f31a382f02f22ad841743b32f733859b
SHA256c73cac6df872b684303f59970d41b32519cd9e95e51adb7e15302e3757e167f4
SHA5126b065c967916ec7c9577d5a6b1d7c6e81eb355549a4b942c26ca57345dc166212abb45a08040bc6a44e192f6f4e52c553296be08f0da526752c190b3e37bcdd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd010818b82a092dbb2ccd53ee43b75
SHA10341573855c89ddefcdbb10fd17527eb8dbdd5bd
SHA2561766474e577a059f0e63446d249157b37c30c0b42f2690f9277f00a2088e00a2
SHA51255bda056f900c30ba1fbe763d49e4144bdad11ca688dd2a0f6ced122958f16251fb37fde1c8271dae15677cf72a65bda02319ed7ab586050cfa868e0fa19a3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e694ddc889638e91d935b1adf0c31499
SHA10d1a5418368d504cead90505c8f55a1202717d29
SHA25658944ec32fbfbf21a21f021e4129a4ccacd22955df6529b3bbb15d1764de0473
SHA5121725f50659d94056715bcef5d66741639db7e01ca4bf0e7920dd6283119a618de1af33d7b6c15c79d2a2acaff724de9e7a38ca4929d5fe2f499d4bddb45f3ef5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b