Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
eab5614afe193b08d97636ac4e53a2ec_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab5614afe193b08d97636ac4e53a2ec_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab5614afe193b08d97636ac4e53a2ec_JaffaCakes118.html
-
Size
30KB
-
MD5
eab5614afe193b08d97636ac4e53a2ec
-
SHA1
cf2f0d0dcbdf00524681795f738747c72cb54ea4
-
SHA256
4739aed1f4d8415ae545da623cdfdd033e64a0ea6175bac3055a33edb781b397
-
SHA512
c3aa9fbc92c159516e527e18c9a4e571c725f18d00f9762812e776f02f2bbce2d87a063d6795b7b18eae7b199a9cc569fb2c979de5ef88698247fb9be1169573
-
SSDEEP
192:uWzsb5nkFnQjxn5Q/XnQiemNnonQOkEnt9RnQTbnRnQnMC+AhDn253gbiYxYJ/dT:UQ/UQBQ9xYpyQ3ZbDgO/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203c8688580adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3C6A6E1-764B-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887166" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000fea682492bd98a18cf004123c7e24f7baa94329410d725d02cd67ca941b87b28000000000e80000000020000200000009c30e27fc54e2aae28baf0baa1349239aac3496bbe717333f72be425448f918a2000000047b75bdc6e2bdb0805cd38154a0942370048107405d9ade3c1dc4873e0a9a345400000006327a45013d68d865cc2e078cee78a64bf7f680c71d8d3f76ba1059ca448d3d76e5f43bdfa9bafbed6d13caf3761ebecd13423a2099c4ef783cb452261d903a5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2356 1688 iexplore.exe 28 PID 1688 wrote to memory of 2356 1688 iexplore.exe 28 PID 1688 wrote to memory of 2356 1688 iexplore.exe 28 PID 1688 wrote to memory of 2356 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab5614afe193b08d97636ac4e53a2ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f25e1aebefc992eab2a9eeabd611b9
SHA176650a6e94142d1de199d0b2c7d2e142f4d2f30a
SHA256ceb31df7cd80e2dfb6d8e574e1ff9c2a6406d12135703b3c40d7032329bc8c1f
SHA512207a224ee737d4d86dd372e7b4e28a86683e0f01ca731427cdbea410f0ee6b675fe82db44aea97fa98ea1c862d0fabcdd90e3228e8da9351d5ad727a9985cbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6f2d1ae5e0935246ce0094160f9601
SHA1e569d69775b7785166b2caf0547423dd9e9d1623
SHA256dd86a9309a7425f5715f4e197004cd9dfd0e78a648704ca930f4ccba7cb29205
SHA5125c6283bd55faa8f491cefb4294d784a3e731f04303ba886f4ce7979b993934933949340201f1ef502484b3abfc22adb52fed438ca519f7756567a07e3b055872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b443eb8766bd2dba3e5b8f369b6682fe
SHA1d1979693099f182cbbf198f5e12f1cd19174f5e1
SHA256689ae733b62a0bdff7564f455158f6bba4396967fc2c57234e9babfc742f8279
SHA5123656856e6c5ce73cb36e20b0859e8155fc5f8c1ea5abd9d2e1d1261ee8c2788dfc88e83ab1b2ec14262cc4dd0c43410456e0aa226480cfc6395ad8e534cc7f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e5d39c01b023648be2e8afc5ed74acb
SHA16448dc1c21f310950436171e8573206970788e32
SHA256c4b9838c30cd51d05358a6c3e671afbdc8a7d027d6d607260dbec8c134bf5719
SHA5122659d3ce042bbaf0f34bd0e4cbdd9868071c8e46aeefdb9dba8835cb588ad587c14b64a5a9afc2ada0ad40125c3b44a495cc38c409af6d6896199e44d99c2803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f9bc1879c97986a1be84e3d9f86210
SHA1d990048c2fba743ef91810ac41ac5f0055022cb7
SHA25638d375ac58e6172409a2184cef58c9cfba6b09d470bbd7af136ab399ee6f2698
SHA5125a4422b1f5ab6c70951cfda0b534f15872f3cb5b56288eb303c6c2291fb169d6c843ffbe93ec814c95661cc187517851cb441c180c66c85d123f688f7c61dd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d040b16699eccb0bc68f82ac28c61de0
SHA154b5cd465271fad548149bf8be71c627e36d04e4
SHA2569bad11c64d0360cf6eb3ab4769f04a0515ae3d91dbf4b7a82a3510577671af03
SHA512e085c213d7a7e190bea9439af6c07fa35c35221945f862d6913b477f3b788d6bcc3ffdd8071db049a7e11b53d5b49a5cd1a59cbefb760b017c3a260582120daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380983788e3bc1053e56c975e7829c0a
SHA1280d11a5a413c4f34433ba1014d8dc3a7b97fee4
SHA2564bd2f346210085fc1a1b02a293dd80334d7c45f00a953d7681226d5fb01d5eb7
SHA512d0a1fb20a3e3c101f0c7be6419b2fc157637f26a2b9cfd983c61f941d7bbdbb39b43403d0fba07f266e19ece8112aaa2d6f5731a6221c686f579f0a8419626d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53de26be7ecbe8c507993e234ba774395
SHA1eca2ee903f709631c61e6c90539bb02033c5a4ca
SHA256c8eaa66870d469c33a3a8037c2bdb2214a40323d072d66e61cec50c40abcfc5a
SHA5128f80f024d6e0810714fe8417ba7cc7f08634d4da0fa77945eee9c6493c52851c45efc60f55ab55770c7e08562494a4f5adafb8ea35237d064e8f63f71d005579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4fc9b847ee12fea458d94703532afb
SHA180edca17772e1161481af8842302c11457fba1bf
SHA256c4cada322702f7155a07a417eb547f85617aeb5251e60b29d7887f6b2e45c7ea
SHA512b52e5500d7ef01ad13602d5361b3dfce7ffbc9fa7128483835240598a14e0a743d2b3a7f09c7137f7b927d9527b6d0c1a9589a33475c1f930cd907d098035bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50baacbcc947072617184dc574cc5ac83
SHA1a028c7b91265037d21044336936c944f5c0bdfc3
SHA25696fd5f25a3d3fa584a586c6b8c546c967cb0c370b548ff82ee1415ef3e792eeb
SHA5122f00dadb6ff79af632dc2ae8d89ff5bedb9d8865ff6fd97e20b9ed6d0c5568255bbffd8eb68b2fe2bdddf4a1b24544af61c057c109d9a91678da601894a1f66f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55220161293ed27425c3043ca1182429a
SHA110a864cbd0ce5f0c9c4ac17130600544831174ed
SHA256a3d5d611444ce0703ff146329d9c2741741cd140d681ef94a8e88e534036e21c
SHA512b9f8a17ac871dfbfc99a681633b6cbbac15c79e134a4d58162c4b486bc49684bf7dc185bbf09b5144393906665102a4f58641dbd2a29a5b61e79aa1d19199120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f79c90794e56aa9d81e4062cb7add2f
SHA14ca7c10c837ec75231c2b05881983f31ed94186b
SHA256fd42adf2d9c76783b5a92ee7f3dcf3858031de90222fd26c091514e6074b0f16
SHA5121afc2e87d590aeef7d5073d1e81a7dd0ccaac0c15ef63408b4380035b93ac80be6295b1a58c6550237ae7493f18051b694277e4b5acdbaf6032e108840b9b087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa9e4b5e31909c55379ee8c7b527696
SHA1fe52d3baaa6b16264ddb40ea994f139f13c0997e
SHA256acfeb4dc20b44cb4e0c738b92f83a81d814ba63c1f9c4a217b8faaee6be66b40
SHA5122119e2e04d87ab73a397440269f463fba19dcb1af543d213ffb708e46470c6d6877f104293c801d8fb64c01c2b0c24a6110530001fefda62baec977cb4073195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abea24edc6869b2de9d3a811caf7d332
SHA12c5e207f5ed63d647a4e3cb925d3ad4a0e52ffd6
SHA256165824dafe8d06e7327a5948d548dbb4d5815eb9309ea4fe372d1ce2af86ed98
SHA5126b95afe375aaee23552e33b21ea8ad84580f347b77d729d84f42485ae345dfe2e991ce4b6ee61df3bb0ed716e4523ab442d851f83f6a4e46a00a4dcf916cfd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55111102a1001d8bbc2bafca4ff487191
SHA1b51a70286f2a9e2d0d5332e3c8745b2815c9aabb
SHA256859bc7876b0c155f662aa63e7278c5058ed09f1fa5aff71377b713cb0ed29be9
SHA51204d663336fe40fda2be4a30d19da9f441406ba85f502c72eaf72d14f251305d87d0d369ea6818fe11ffa9f321228ef1460c1444b1c1deeeafb14535a1a3f8f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585c5b504c4d495063a5dfa66ace3bd1f
SHA1736bb1168ba5df14139a7b4157abaa7c860462b8
SHA256ee222d646c101859ea9973302b05be2fb72fe126701a27194cfc394070b2fca0
SHA512d9af31de3126c89b20bca3336b53f77439ea7ea26693bedce28814e477c62b22ef511af61561254b19f8234469a932583e36bf5325cc21a6c9362589e95d274e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5562c8e4d8b958a32b80dd1dd12058bda
SHA18a6f933bb65b35b7a4599ac0551707e1c56dbbc5
SHA2561241ad09a7b7b82ef426a22cf257b3f40654a2d9d3c6744fd96963e0f87041be
SHA51267778dd3aa3be17f2ff6773329eddb4c427d1d7f43e71f66e460f0e4f9d8ef1d3df67f492bdddf1f6bd9e44e328df2d65d62839b0a89bee449b37408040a12f8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b