Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:51
Static task
static1
Behavioral task
behavioral1
Sample
eab43e63c6bf67c7c8e5c1771560527d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab43e63c6bf67c7c8e5c1771560527d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab43e63c6bf67c7c8e5c1771560527d_JaffaCakes118.html
-
Size
26KB
-
MD5
eab43e63c6bf67c7c8e5c1771560527d
-
SHA1
a5085bba1499c306ca7c19c91fa2b1709815f2db
-
SHA256
79d25db8d1327af48d3006b5d93f239bb12641df3b04ce97bb1ac849b9e63a94
-
SHA512
bf203415d40e17873b5dfd80ee6739e763b716a270b7ea532777774b2a8e76462b7bd127286d368bdef9236b4c825f4654d8abff06167373648029630f8a8a7e
-
SSDEEP
768:npUXBeZvjTIB4IhBzFWjlkayipZ0DeqBO:npUXBeJvotvxzdiHceiO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20acba1b580adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000074348bbd99db0ae646de194be78743163ef40b863ecb2a756a595cdeff992b43000000000e8000000002000020000000f1e9a038c41c60e87efa498f84156507309c2673c9f937e1bd51d9c5ce844c539000000022d9c2896612bd20eb120d563ce9bc4e32c6d1034d6cf818614a6c2d19cb1f872295f9f02e45d5930e4573bdbac9cb43d659bafb08c6399e48c74306057ba44ebe834df49b5d17e8cbd533bf5b61cd187b41285985e718cbaf1f6259f3df8b85157fd63b0dc51995c7cd0ad52d0dc3352ea0c816c8e98b7031385602463c45ce1b80d621ce648d9e8c439f58dee275c54000000013c4e5fcbd6b6d2a475bdb1b74b5b8bc57d56f509584f31074c84c7ea747e0d76ee7d3d3698f91405c6407c4524eaedd231a5d6b383be3921a4146caed4bd2fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{474D3E21-764B-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000779483544c5c8631228494ed70292531812ee4639f35534918443739312b4e5b000000000e80000000020000200000005367477f88868f59d059718bd0c98561f220777af758ddd0985b45c8fe7c43a620000000684cc0640dca5f1141dad85acebd77c9db5ccf62eb89786fa8e1b888e968338b400000002c486f13baa02b1a05324a31fa84b13b7f24ed61601b635f304c2494d5981a8401d8b0b2c601d4c6be24b5e59b98883c11f61b8ea09e42d97a83a318c2ba5fb7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886983" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2380 2060 iexplore.exe 30 PID 2060 wrote to memory of 2380 2060 iexplore.exe 30 PID 2060 wrote to memory of 2380 2060 iexplore.exe 30 PID 2060 wrote to memory of 2380 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab43e63c6bf67c7c8e5c1771560527d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502febe68c0dac6cf9f45d91979cd0fc0
SHA14fc003d72cbe7c1c72a88838b141c990066f1be9
SHA25656eef932aa7daa3a3be317434341d1cbcc248a89d22996c354fa069d2c190020
SHA512d65fa3ada4571ce81f9623bc2a4ad039be3a2072b7c5e0be539e0780b5890e8a2d074a947be6216dc78e5d9fec0b640b71bbc50c49878ed7c1b0f2eb3c42f8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8b2d5fc32337fcedcb53cebf495507
SHA1e83f7891152f38f8c78bd77cbf4a322abdb951e6
SHA256b2a4d815665692324aace872f9ad6f8e5a7bf67867a1ca79db53965a52f6aa12
SHA512597cca79b4f6d6ca26ea9027bf40c3e00efe8d271f3237ab3ff4969b26366dbe9b1603b91020a8eaa4cd97cbe999e6afc73d8e411b76c07029357cd72b066e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79acfef93e91c4969fdc61e7b9f4cc7
SHA1cf167393299e6899e3a1b23b6f57049b3e4298b8
SHA2562ce4be9db34cdd1b48e027763b9a719529c02b25ecb75d6ebb96b7b198cda8ed
SHA512c2c5ec8bb55443e313148c3199fdd69ff0af1783659c2ac6962ff589375c6a51c087bbad8e22915880ee07485d2259663512d0fc266eabe1f3df227692e6bc53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58787b5acad73df970a1cdd17cb0ac323
SHA1574ec567946e42f70cdafbbd1f3add87a3de00bc
SHA256d057e7ed08385b37163161f10c3821405cb054b8da85afd2b715626da256de44
SHA5122e0dbd22e1cfade3d595afc2bc5b8035e0eafa1a70f0cd8fab2167494004049b63d44fb26930fef888ea44509b9ccca97da1fd4727c070cea628d4e0f0962297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52124ee2200a17b60eb7f23db0c2bec05
SHA156b535faf50eddcf2a60666f1766d75374c0af8d
SHA25614b3766075874d198e83066416afac223015fbd62b1a032de5a45c7b450c5ee7
SHA512f3e79bcc4e5c872265bda2d800928a7aa130d57b5db9d3003304f278afe2df4e046124e05a4b2dda527d6a3d59d5a558f63fdf17055c7c046f514c06602de998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f64cfc36525e6b30775a417b583732a
SHA1a76fdf99f1f4ca7b80ebdf8ca97fb3f5209c239e
SHA256bfbf5d09b43b32db5bf96796d3d156f2393d6a49972158566b1f3aaed317f805
SHA5124674744d18b8e301230ea3e3af8b95f9a335e284611b0e93dca68dfa144934892079e371689fea3f23fc68b3eee3a79e9e9a4ee0ae973c96d422b55f696e525a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a891cb488f5e0b0f7847e4ef2dc2be4f
SHA19819c4bf2b47df5776c7ee92bc4a98a657bc24f5
SHA2567663c77e6025a0cf9f1ce6c3ff71c83617dd794c2135a232e3cdd56169324bdf
SHA512a10278912e2e560442f2b5887bc1e5a15f34c9561dc5d4cc6ffed0f56ec2fe6ca04befa2a69260b83a5dddd9b1521bff02d1cc739b8917f80943df719bbaf4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597daeb975e393ea585651a701de7f966
SHA10adb924a50b9c6054738281a31828529762c6626
SHA25672a15232fa01bbee98a1ec559b35c72817e8c2a39fbe15d43d03a15115b51848
SHA512f0a911811591268f8b474a82d17a220e2636478b69fce673e45f42c29895e1d8bdb75f3f4dc890b0725dd14a64cdf15df2fb0e36e6982e81ee51f6698fd9af1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52231ea01c9e8659541f3ffe559b62ede
SHA193120a7f6f8c1dc4d69d01439483bceaeec41056
SHA25610bf3377081f8600b6cccb119aed53f7ff1bda2b7c46564e784480d400791558
SHA51229c13915e16564bb6f740e8fc263f0d74959bb3d2a458cc12aa0ee0d4e897739385e2e6a89f4f2bb84c1959e668a2bfbfcb27e15cdae56f39cc9a264f2783683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adafb1819b0b9e9955efdcfe524ffda7
SHA1f4a4d78bb9b10ea03f91a6cb413a4dfd814bb528
SHA2568de5c9f0d5ac598f67099ee9b4e2d030f162b31afb69ac8c3c1c95ab62cb7fbb
SHA512016a96a36be9371a80e62a1202a0e591c4e449a039409e5a438c50a11c9a117f5d94c4ede94d447e7cc222ff1e2129bac212c907d04ec58750593cff26871d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fedfcb04147bf7736e497a39f3689b6
SHA1f9c2cc81ccfb286e2cc4ce3dd4abf27c783ebee5
SHA25648f440da957a4a4c96f44a10b242c4d878305dfa8908a0cfa437b444ad954985
SHA51294288767865c46066550350d2f128514dcce21d270ff86e4d2a8c061078f9b1fbb7a5dfbc85ceac23452e71101a02a61b101c6ca2299c7ad94fc7c32f1b9e1f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fee614b2061fef639d7146c45b860a
SHA1875990e05691a50fb07664d466b9693ca6992bea
SHA256d4b4cfe4ce7c1e53e1d952a1fdcf7636f2715565f2224767d4eabdfd42a03642
SHA51254ee75bf36747be607a78e1b8356d91d195444a3759aea05c39852b00b00309fea4a5901fe1d925541917aa3a935c700095513961990ecb519c6222af618d0fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c070a1d59f5373a177a6b64ce57b38da
SHA1ef013970fc589e885e9a8668e3927c44d62ebcb2
SHA256cac0a4b5eb752f465bf1684bc89abef2a6d3d72835a146541b5f82baae76ff18
SHA5121ff00b8c0d4270ff7ea463e6da03303786f5dbc9fb211c71317dbb88c98c512c0d7dc56cb2af733a855f42863a9d376f1597fab4589299a4dc5be3d130a5bc57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c824bbdb40736217fff36041d962546c
SHA1c6088adf7755d93e5106328bdb6ad38a92d9b426
SHA256af06697c2e784972d9d5dcbc6d42357576ca148666ff0346e07571b6849e5530
SHA5120688abfbba817529050dd4a6d59512a283db1d93431ac40c210f3adffb720a1ea8baccf4d5aedb088a79e1ccbb2505eaa04b154af0d913d496760efee2037da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb624d1507d04a6cd62ae82c83380e5
SHA1a4c20cf842f1edbe1bf5573961cdc37232c6d8b1
SHA2565dc139bde8c2d28e36baab09449595e86f6f26426d65d1cdfd6df95940d42915
SHA5126e987bc389d10b7e7effa54a1f43a88173198137e45d86a880301fb4a543510692012557aba67079a12b9bccf09758b13f39f527599b0d5971c48ab781dcfc89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50a66a5eafdd33aeeedd856a76e7300
SHA19c3b4fa58d353e16f6b18e24090af7919c77aae9
SHA2569b6a0d93678affb1a90d7629fb57562f02da8110d48d6eb92b6069867bb3c7f7
SHA5129e635c42d52f3b69bdf7c0b3cc3b53dc831d45130620443dd4c173d2794c0d6d1997ee4cb5fcb4fc52c1a6e69a829e5b6aa0e5377cf849418db550fca89d3f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5787d185c69c83a97cd77884b93fc9850
SHA17776822e020afd93e4d325a55567d7af24f8d827
SHA256d50b1193a5d41c8c351001d67ede663708276e172907ab838f7e1553c578c171
SHA512faae9044225d82dd56fb9d3095cb6c69e731b582e9222f41a43e2e40d542b1ffcf2295c309101881a3d490f3edeec25e7ec430061a173488ba69decb57178f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb16462daeeb0008826f915372f2b106
SHA188b4348f65a269e11263fb9295c3bce17db79a73
SHA256435769abad4ffe6647a1df3125f418261e8806cccfb8a2c62ae5f8e73c41cbec
SHA512810b49d4f3de54ec3b27249db5a459b6e8c77cf77f62135e6077a3ec2b388b6d67a261e294121d834f8b854ab705868b13d5cd20992347d73d7b8bfba38ac0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ccbb52cf2d915efac17efd6be71458f
SHA1020ca5e832ec12f82dafd2631926872cf16beb27
SHA25695dece95646a56ade3d25c45dfb1e05b615e9257c67bb1a9ad3301a80e49939a
SHA512c96a585d68a450993785cd002b48d1d1e79a5f069d28b0ff0206aae13e5b66ec1ab0cd3314592a5e30fe3aad2db1028999b625eb2f1e0ca678f6cfc356b31a08
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b