Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
eab610d7e2f54bc468de2c639352d6d9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab610d7e2f54bc468de2c639352d6d9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab610d7e2f54bc468de2c639352d6d9_JaffaCakes118.html
-
Size
519KB
-
MD5
eab610d7e2f54bc468de2c639352d6d9
-
SHA1
bbd04f02ad9ed0e0b5e0688fd4fdd2c722b9ee12
-
SHA256
e356ba93906fcec6b6ad321402d767c398a0aa75e8d36ac6dbdf773a5483f890
-
SHA512
cf163263b7c685dfcacf0a3f2291a3c231e4c872b2ace0114224a34faa9610f95fd5fc3c4cbdaf2c410526b374613eba37cf442f567dbeb690e38ea14013f980
-
SSDEEP
6144:sQsMYod+X3oI+YReJOisMYod+X3oI+YReJOvsMYod+X3oI+YReJOm:v5d+X3SJOg5d+X3SJOz5d+X3SJOm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887237" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000f7f313958671a33ed39d957d2b97fd554fa2468979886e1d214dbab767f1dd97000000000e80000000020000200000004acf7d1715b078ce302b100b0fbb27179e8dc1b6b80236da6fc1f717314de347900000003ada38c7a95011d059e2e638ddf85d254f05b250e8120b22483ffb05d1b2339290212fba25460134e334ecf7861a651294cc63ad35165aba9aea2d18047895b56ff5d4fbbe04bdbb1bc3e74de9ad829bc36b9932598c43de59d083247d59030c9be94a705955a3baa0df31e0ea1cd95cd74e23339668b4dc4d985e1d10270665affb58a30b667239086c2801c522b631400000005ae35175ecc4e0776553a51f9d788b87ca557de4a71ca235fd3ce3626f39756b2bda46d1e5150f527f719dc8301c6312697f7c63c86f70d79ac39c9c72a815b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEB69091-764B-11EF-AE95-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a139b3580adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b78a85a3495bd5a11d10de8b3bf2b13915db62e11ab85b963d77c270bb710c6c000000000e8000000002000020000000c61f125f55cd558697d146051d358791384af745f9044338613b53169a5c52ed200000002f7c9b4139751fc8a3bc0b2f48bf475e2b80a2f42d1905a93691c9682655010b40000000eecc5dbe6d937bed9aa1ce605492c3c74ca4ebaf40d033d7c71e04ba11c73e2a79966e5d621ff03f4529a2f5edb2d6e5fdaa56610d51b8116295be083cdcb1c6 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2808 2856 iexplore.exe 30 PID 2856 wrote to memory of 2808 2856 iexplore.exe 30 PID 2856 wrote to memory of 2808 2856 iexplore.exe 30 PID 2856 wrote to memory of 2808 2856 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab610d7e2f54bc468de2c639352d6d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8bed1b4819184eeae91aedc9fc195c
SHA159c197a8a537c55ef6e260f7dc0d2deb7d0fa28e
SHA2561e6775d4b6e9c4b4e6de13d7c3d72e5c6f803075ea10e5c76afe3f1edd598828
SHA512fe32f484615b28da4e39c9e4cc70387228637919d18b8741cdb0bb67d63f58fb207e6b63add9258f62db126f716dd2d59080452fc4117024d5b97055297cd9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ed684618c319918fd61bbd12c71ca4
SHA1790d05b2bb2df85c0275d8ae399cbbf18f8446a5
SHA25694815c754361ae6ffd3451cc097f1bc9f2e72e2c4f9fab783c4751f7c77bec87
SHA5125e0b425832314a6fc5c53b9012052f1b3d5f58f07eb12ec49526ce20e7d6750f296245976ad902fa73eccee0f4de167c416ab9eeaba3dc82b9720b24ad0239dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed629759dd9e3e591502bdd6113747b3
SHA1294954499614cdd2864999359f8e3932ad0559cf
SHA2569278dd818ed8f6018a3bd626415701bcb8ed8c836f1ca0e0cba6b292bca3af83
SHA512e82115735f7986816e4b99cf79215dc48ec93e831845a181ef76ee1056eb68efe264b25f02f38ca68371b70480a1296187e150f41c86706c88aa039c01f96d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb8c60650b0755008e6d4e02814b6ae6
SHA1b9f7f9d7ac232f053dd3be1525d69ea1d486375a
SHA256eea9f15cad0e7236894cd8ca774df6d9bed839e2b0d4e3977d8bfe1b6be095e0
SHA512f1fe9615783eb5094cf175425f6952e24cb3bf935460f5c2a2ffd5f7ec5408e0fe54d915218b7dbcb0a69a01bce1ba2e390d76ba645e56988224a145c36ade02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b5d3a70441de90fc749145345c87065
SHA18d0ac7f6c65f29482c13221dd36be8a50cb39857
SHA2563754b3628a0891b82a3e985d0866694be04cdf6f122caf3ea1378eb25e7f9819
SHA5127029fe1553ddbdecff36069ee6a7f113642481563c03330664d7a34728e7a4a96bafcd701ef008443c47246da0e243c89ff527fa1f34809f23c14383d5012e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb97cbfde6b1e0a4401dd599cdd003d
SHA1b64b35fdc6b3799f344f8fbd5a1d2903e1f9bc37
SHA256bb06935cb7d83b73214db572b04d8a21a9a28cd4923f68d599d85ad43cef3c3d
SHA512e119c89e7642eb6c2dc377e7cde5694a974a8f41cd930d217158579e7e536a78d269e5cc1ec7e02f57db07a0e9bc54f85a1ed5c541069cb775422272265f5dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c552dad16e5e4503476c61deb1b4a3c6
SHA19712e57194b411c6b905ce049ca6b0602a91a53e
SHA256cb5f107730069ec735a2fa1c7e12f30d74fbe2ebf5a6e56940d30b67b020a2a9
SHA5128ffb435d9450eb31c6cac10a0bc0556926eef5daa43048fa275e3f237e092dc1c0dc3a9d9f394a317b7f16e1fb76df6d8f2e3df4eedbec6f402093e422dbb409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfbe3f3d80d3b307e604d0ad1c27b108
SHA18355e8e6d87cc51f4540e65b75965675e46dead0
SHA256db62bda5d452bd28a015613659dad37f2d39495cd8455042ec1e333d979c83fe
SHA512af2f2dcd2bdd9c9c349f7b30bd4071644dc4839a0c3250eff476613028309aa3958c8f9adfff88ecb60fc7909dc09ebbe13ebf1e39b3723f280178ebcc3c51ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f249233a3a330b1abbd0b624ffde7c2b
SHA177498a0fb860812b5eddbe86755f46bca65ffd80
SHA2569117d9ed4a983841bc3eb5c2d6d463abbb2238a0b312bda71c9e8c2eb0d1844c
SHA5128256265086ab5d76cca95a42eccb9dae53548ec1237a7eab4962fcad35adcc07efb44c21c4ab312c3854bac605e09ef0551c318aa3719feca2e8f82d00d8c095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c447a7e774a932a45ce9adc16afb0624
SHA1eeccf0c8c6c10b32853486468c46894edf01eb31
SHA256851869a8be3a290254e08e19198423c3274d40509b23aba772dc9c1389775cfa
SHA5121fcdc29c2e50ff196d3991165a761294d6a32cfed2fada05dc1030030f381342e9be78802d93eb09f3b3dda6abdee429824038f3ec2ef18f628c8f5e0e2c99fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760c32f89ab38bcaa3d2276dead8aa0f
SHA1bc433874a2edeebe97dac44f29dbe967ac240ec3
SHA256dd4e299a8d0f22038fc976aefcc5abc70307950fe9db1742941163a81d92b5a8
SHA5126806ed15ffb74ede3023b29c49d2eabc96e103b829b948be4cb45d8e93bde812b4b3764aa9ca8480d2fe01820b8b92caf93d6acd3adf640e5200277bfe904f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ed01e61415502237af92a6cc599208
SHA1cb520bff128dbb4b034aaaa0f185d044859c5a91
SHA2569674f8752bfe0a4e5ea000acc49eebd6880449bb1de8aa626ccf9bc604c5ff8e
SHA5129dee843130a3112d0cce3ec34084b9e2290029707ab38c518caeee71464c70b05f7425ad46d0154507bb43d265277658d8a74971b9e2ee9d1232797c78b88505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc9db27024253cc8d96d0abc2d3edcd
SHA138a1cd97e091a1362ce4b4f88d4089e48806b98d
SHA256a841ee4e3572e55f5cbdce3e46bce9340cb2f5754362caf8ea5e29d7ac88e439
SHA512f53b9f0114417c02a8e642eddf85dfea1d0e640cd2874ba27460a2a8a7f0dbb822afb10b06e4d59a826526cd7c1caee8082918bdc28852fa588d9adfe4bc8434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ed6ab6b81ac271b7da7552cad722b6
SHA133a0aad2961c71f21494ed4b7115fa185633ac2c
SHA256d627cb2257bd0e1cd7cb9d93438e8870e002a5a756499494ffab0ab4fc289834
SHA51248db839721de90028b0f840a4e3954d4a92da1118eb702cc1bb07247cdf6dbfeef990f4c2219d755c261535a7e52aecaaf0c9fa006e5a20e40dd5ddd4ebc2957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544afd5528ffc9bc90936ef03dd739ea3
SHA11fc37e83bdd28fd8239e3543c8d1284349736a7c
SHA2567ff680e2bffebdb41f35b43be6b799e6c7f0c71d9863d4df7dfd46cb3fe2d65d
SHA5127c5d40785235eb0e458b5f24e45e591c177e15f384f99254400768e17605d6e4403b4a31e754dc05de558489444739d219fd7cf8d08eb8ffdcec3cda0e895949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc962c68e1e58906279460f5942c5cb
SHA11c4dba92cf8ab87dee4c1ef5f7f5934988e7c2b4
SHA2560e8559e574bc88c67bbc1aa68aed24a5af0848649a7c1dc2a9a358f4cca701d8
SHA51296f91e277479e7b077c9831c45944c00a870451e664ebe2a11fb77d9acc1958a895f26cebf42734873ee3310c673ef47f1ce2873bb8534edb2086c913e122e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b12c645b138c9af71f5d06e8c1ee2a
SHA196b4ac89b48de4eed3d4afe40913a2b33bf81db8
SHA256a82577e79f598571f0bb06bc1002945ba62c6bbb8136daa7c6736f14d4f6351a
SHA512994b15d20dd0816cccaffa24b7b05623a574bae44765ac68f3a44b028ffe386672eabed775be690088f7e94881c32160d0de2f22b17d8049a3861b24af02c760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5782288a2398de939138bc945424c6268
SHA17cc942b85165a59b4f54b704e24cf05f0a265a8a
SHA2562e60e0169094d3e22dd254e95895dce29e6a974e631d429b21ac4aaddbda0365
SHA51286a1b8f229ea8039a51b3ea38ec5ef7543f569c6e3c83d583293fa1f168f8cc13b7091f935d4590560dbc5297b3dddbe0cf72cc1e0ad86657a261afd38383287
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b