Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
eab5673fb225ad7778452cb349e60c26_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eab5673fb225ad7778452cb349e60c26_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab5673fb225ad7778452cb349e60c26_JaffaCakes118.html
-
Size
53KB
-
MD5
eab5673fb225ad7778452cb349e60c26
-
SHA1
d9cd2d293f86c4f86923e7f009085c10a7d6787e
-
SHA256
934566d5403d2212f3ef40b283cd91a88ffc1d7ee5fbe3ff618df98a9c5c96b0
-
SHA512
9a853466d8a9332ce1ddc7725d651257d2bb09397780bdf6b484ff5cd0323eab8a114d1067b83fe4d349a4cdb4851f31143e6e9d8edcdc79b564e0ffda6ec71b
-
SSDEEP
1536:CkgUiIakTqGivi+PyUorunlYw63Nj+q5VyvR0w2AzTICbbkoN/t9M/dNwIUTDmDA:CkgUiIakTqGivi+PyUorunlYw63Nj+qI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887175" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000009822583ce67787bc0b8b1b99ee927a900580e120701b7e0c891a23e66098a456000000000e8000000002000020000000d49781dd04af27bd2ad51ec8611370c5a15c6052f108071ae3105d4864de9d11200000007baa5da2d3f4df3cadba3f57abc92f18b322a7d8eb35b87082504fb4651cb95c4000000076d6f0b54bee02deb58ebc90a2475b88e221e36646bdfdba16ef459341ffea6a24f72845a7bab4f1563956f84936b463c2638f6023dae658e2c00ec48fb6a776 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9BF6641-764B-11EF-9B6B-D681211CE335} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106b248f580adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2804 2324 iexplore.exe 29 PID 2324 wrote to memory of 2804 2324 iexplore.exe 29 PID 2324 wrote to memory of 2804 2324 iexplore.exe 29 PID 2324 wrote to memory of 2804 2324 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab5673fb225ad7778452cb349e60c26_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca49c2f4ba87878db440bd200ae0de9
SHA18c296e26d48791d9249ffb8960a6858a687b456c
SHA2562a24a263b515041a7cfa1c7229bf89ee616260ca3fe71f22a4873ca07a94edfc
SHA512941ac7476346bdd04100617727efad1310ed35dc64a9e8d598f0ab309023b6e7117e5dc2f318655b21ce3c69a1f1858800ec3c9a89e97640609bff0acdbbe2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55492130dc8f7112325e6ccd245389c9b
SHA15c116a3ef24e1df9ba7323ca8be784be526043fd
SHA2561925994db9c1e086ed0fea8d0ca4dadabd6b16ad64a3eda9191375f770dc5470
SHA512a9730bb1d6b0fa533f9e3573ef3805c47308ad80e01319bd5b74430cc32006f8a511060f0a5cdfafd03f241290640bb5d43e7452a1399218e3700651e1811f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57835b583e1f0a6464e1adeaca1abd017
SHA1c3bc8d09250f349977aee2bedf0b91f3efcd41fa
SHA2567c65fd679b023204c640ca2b0a585579d8307bdb08aaa18688ae737ab339ae22
SHA512370d3956cfd9825a24cf10e227cee3cf71a739a60398624b9f5bc4fb091ea1d680afbd9433506c61ff9681d280758397467399ad89aec6a142436c306ea6121a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a562e3f5232513f89c27e24d3f5f7c82
SHA1a568c351fd0ded6a9d2791b42ebe6298f99cad61
SHA2568e801d80c5a1495eed34d1ee42d3b4d5f505e8d60a58430b3e78e59dcd6f672f
SHA512a498d5ca434ebdd6eb4234390f8c40ebe1afdef24ffee4877c3147c9fd3104f37cee3b9bc39fabd129c6b04f1ef59f82d46f303282c95762ef195c46dd65d62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abcc4b8e5043de1f8e64cb4fdaba3068
SHA1a61da81ce587c0bb1c4d43969c76b16ab8146705
SHA2563514ba8f6bb272ca70244b65138511734ab9c84e0573bb4e1087f5f592267eec
SHA51230ca25afe4478102ab59c9ccb4c6e8004cf7defd22254362c74f90f698df7543ac4fb8f9ef7e4435b46b23d4436794316d7c4cda3303ceef68ff5fcf4416df64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3222f4fb836b3f0d49e7a2079e32359
SHA1e151721c81c9d9f46f64a63c1f1af3f4929f9575
SHA256b24c4d442b87e0e69ffed4100d371eee8ce49b9e1ceb06f62aa3b411e4afc149
SHA512dc5092ee79f17753b702e7e732b0ddd7bd150e977a01f67f11d24fcd3e0b3bed9de8592e0569e835908e72c938b8a9b4416ffd3d1127f1cb77118559f0af93ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5802d7bac5a4f6a14e715f3f9d83aa0af
SHA10b09ee1600a962e51e58c56e73cca68cae1db1b1
SHA25658ee9faaa66abb30437dfa7008dd14d8d446f12c3d409e76332f17fdb97f45ad
SHA512508beb21d3a5be6b66ed6a638ba3126c347ec64fe8943e458bea9539dcce03d5a59f0adc4621c3cbeec0273eed2d3ac62e9c94025bbb223dbbb8d1226b90401e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e35afc2db4a8049fbbad99728cee14a
SHA14913fd046c9a34a799623659eed9fec6d2e404b7
SHA25610daa2a46a87c69f327072be2421cf664d56d5c4e7d40461f1ffab90d73aac85
SHA5127477721dca5d7c8c6bdc98c1946242d0e8e5892255a401f5c35743630db5b5c57ca246ac0d870b02d8cc05e0f8272c2d9e34d3a5ab8cab62bbd67dffda91eef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c065c9f0b9ff503d2ebc9ed424484f
SHA112b1d5c4344aa5b62894674aa1f53c0eabb6c05d
SHA256ec8de9543a0b5e85820745ae7de10ba6c1e4cdbac517a983a31e1e21f67c95e5
SHA512be6d67ffabd04580b104e29b101a9a32ab32a430b906e1ee8114b189db17c17f97a64c3359437786c7fff944cc7b33476532e8bd25d8d9b7aa58d43434ca08f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092073c5b7191dd769fdaeee072bc457
SHA12c13a72817ba11b8572e9411998edf6886e07675
SHA256d1cd155e894eb2ea6e9fb5b089f1029b4f6a6140d865255bd7dee22e4dae4767
SHA512c1869248ebd4a7807794e69bc4b058175caf648621949041f912aa26dab200e34085f5d6267d5906771149bf6d699546eeed1807868b2412061bd3669c34acf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e5a9f0e0074d90b44f80d8be3c993e
SHA1d77814a784628e67294b660f075b3e19f67e9aaa
SHA256a88dd2a1033046d11a12cb2d8b5e76467542f0c13027b05f54f288772ce8ba91
SHA5121033281c820e201d08cb3dbab2157a1eca5256e530d1a32ad10b1d530a3acfcc556033a82d0b7543aa9df9aff6317a5d19870513c95dcc5af40a442a8d67d9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5426331ed19593eee038cc7dd3f66fda3
SHA132fffe328bc15923aa927b82c82a8604399721da
SHA256b780e19803efbcfcafe1352a4a0bc63d95e417b4f44d0f51bc05b816b69ca75c
SHA51252d38ee51af4a49d91730911f729553fcf23f74617bb0e43cf7176d78906749c61685da43502afa56937f47a5763249eaa3db15e6947e644520282b04d32d9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539972f5d2e48215297c91f13509608bf
SHA14e01900b033037c27544085ac2b7cdca8588e641
SHA256797e687a1a8397bc604f2c29a5edfd44fbcef12dae1ef246f69a52efa0147c19
SHA512b1c8249cdf4007830ef9935dc037dab32ffeafbac68053947ef2a63df86bb3ecce9dd81dd5e27dd0f255fc73a952c914f6b4bc9789b06d77525a0673526bb9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522d0791492d2de4a8f27d92da4f68f6
SHA102d9214e02885dcfe3c0b23ead1d4585ce981796
SHA2565860b1dcaf1798f79583cd892c1ebeb7c66e4484b48ceb30fc57761dc565bfe3
SHA5122a9a5ae2b8f3d669215cdba7c22d73acd39b75fb3e70b32c8c739a160f162572a035b8d04b6e1312539a2f1a0e9e165575a4af49482c9eadd63149388772809c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0e9c83ea362024b7752471a7833e50f
SHA180bce6873a68e580dec0e592214ffb3715d9c4de
SHA2564a8509ebfb2498e49951d006816741efe0e5eafc7ced143914e395631b902798
SHA512ece6e784d3bf2412d373ac99edb1eaca33486c28ace3df72de7fce4b5b29953dcd2151cef5fb3cbdf264031dc57ee0a75d17c374391795cd1bdd502ccbdf6dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb02a291f145d6eb0d0e909bbe87827
SHA1f5d175a823eca9d3d66edaf648c8d5b50ae2a016
SHA256347b1af17ca180b42bbd665610071cb58f94ae7019457a69afa518ec7557ff45
SHA51214d53dba4d0d27b33d6391cb37cfee4112736c66d1474751e4fc7e53aac02014f4c4055e0d29669c98e34ff918f52cdf167565f98d9b7fa9e5115c491d853bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d44d0b3dea8486952f6e20213dc4480
SHA1345a5577b15b20478971ae7958e1fa1a9b5da49f
SHA256ac7f58b0361fa31de9c5fa3252b5574b9d32160176736c63b42d4d9424d9e7bd
SHA512b94cca98b0a68f409c00771216a140728d9ec8cc20e34975c2cd224b5e1d5f3e76a7557ce2450a50b95109a1ff59c384d1b6241a5e4bdf6571ae49181bf0d874
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b