Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:56
Static task
static1
Behavioral task
behavioral1
Sample
eab62db736cd68573bd7b04dd64f068d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab62db736cd68573bd7b04dd64f068d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab62db736cd68573bd7b04dd64f068d_JaffaCakes118.html
-
Size
70KB
-
MD5
eab62db736cd68573bd7b04dd64f068d
-
SHA1
b031cedea5a662cbc87c47dd5d0be236bcc36e5a
-
SHA256
961f624eb85c2b0df74ba8ac5908d2a7492765d219d999f78092a908dca47649
-
SHA512
fcea907d6f6267480d688f91ff50e3312ea6f8fbbfcc65cf61d00f659e99f7741072825f592ab4739120b15e76fb0294dc3f0a01cb0d9121b5ba9c03f20fe272
-
SSDEEP
768:JiHgcMiR3sI2PDDnX0g6st6SooTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JFJTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000027c019111a738c5dab1880314828ccbe0d64fd256db1e364700fa5b4ab6a70d7000000000e800000000200002000000062a87f3203a35b68299a331c72e1bdecd0efadac27c0ca9a9742ccefa6e89a42200000005d352b5aac61cabff172b46800e6381549c312d87c8db38341331f3a039a1c26400000006bb652868776e0f82aeadce186d3091382dbf27319bd8a4d1c4d7c9730bae69206828a8507e041797771be38b7756d8289f6f829e096a986b5900c3b9c23a892 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE0480C1-764B-11EF-B6DF-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0306ec3580adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887267" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2612 2992 iexplore.exe 30 PID 2992 wrote to memory of 2612 2992 iexplore.exe 30 PID 2992 wrote to memory of 2612 2992 iexplore.exe 30 PID 2992 wrote to memory of 2612 2992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab62db736cd68573bd7b04dd64f068d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322fc5ff5a5dc6776ab861169f78c6e4
SHA1255d0f52b002a10f55a3690335bce7337ae3f5e6
SHA2561ca4478022357d9ff6835671f6fae79fe88ea11fdd2c825f186518e3954b5cd0
SHA512e8f961ff2e20b324a7c4b171ce4c107c8c64d9bb38005d9526503930a00f5aa8d082d73973dd2d81051a755b83f79e1d63a59300839c992477ac995de28dfdec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe869eb92a13a0b6697c8b65899499f2
SHA11e0656827135336b659ffe9d588d380663099bab
SHA256c364bcea9c6a8d818b4a3c99579ef2e4db65f004d933b984e428a70d97eadd64
SHA5124125349183dc7b6ca5cdc75ceeebff802f00c62cf0e6dca454e94acd654c247a7182a3b6b30aba9f4b48b9d3903cc05949b99e52257fb109a399533972c955c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564bf84cf9ed78cb93d8c3b12f9b9a3b3
SHA1b003a08aed0ef4f56d6294664180f302f3b5affb
SHA256420929eb16a2803c17c1167222c3cc1801d14eb34ad961e3cbc4366856e006e8
SHA512f4c9a465091f3ce963e8ae5a9397dd5aae931d6a59c6618f0f9f1ffcf4d1dd0bf18aa13d43d6e1b06ee2fc3b028b0596c985e8fcc513daeaeef0b3516a05cb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315e1a630ee9545d1e7ee778abb1d26b
SHA1bee173fb82f172427e21f3d3e5acc9109f6d7abf
SHA256b0b5c30a778dcbc3447c3465c3c8708bf864d1052a688d8f0d12a01ecf57ac49
SHA51272dd7500c1e8f648ea973a823824eb13135430e16228ef7b8099bb9b71525f15e8497bcfa77be315e77323d88d9518154f9c4f72948cbc351bfac84eadd5ed4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0124db91ea95c96d98a6703ed2d8e1b
SHA18381f5e1883931c6a39c0de59e6f0a525a308b39
SHA25605da57de4fbd3e50670450132e8b96f093bcd4711d1648e1885b44510ad53607
SHA512d0480c28f3c52114bd5c98492cf807974a1fcaf37ddc7cbdb7045b8b75aafa4eff372f3ba4b3a27169b24e2e8b1ba38e6f30014ddf61bdcf65bba27e8d64cd8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4f8b31657e66dfe384ddc27318dc12
SHA1f8269c79bb0c3f10821f5a3b254769df2c5dd89f
SHA2564d870a323370291e11f70d1372fc502ce810451310b05648d7171d3123bc0618
SHA5123a588cbf1dedac6cbd4c937231c30b011e2f60d68d266a1415efba2d89fdca9a67a40347a064b9ade5fa6be4b8f173cdeee5aa4d6d3cdfb37a6c3b7fb3bff4da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db270b5e78cd678e9609154bebe38e2
SHA1ac045cc89ac685b782bb0790c7f5514830d28641
SHA256600678b3b0fb002b1a659c0d106c7c01723289bb7515757f646da62fdf635706
SHA5121dcab8a7400034c8167b7a1813d79ff2a2db62235dcc844fab154fbb3eac8210c885cefbd06a897a0438edf2bcf93b64c7a38c238bfc5e9e5238aa0a083b1e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d81af505fd85054a8338edb01707dc
SHA1095b51f036de738c3b61778ab7ba1253faa14cab
SHA256c8ab3e14344e00cc2b96614b2dce9a973c1e616c83e894a64da5da87aeb4332a
SHA51241a89e02d008cf4021df501ab22987faed93d190147b69eb4d7c7efe811908fbaa37de0eba5738a811ece08500cb87bcb2871ccd43c93704677b99995276986d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3c9ad7b221e292e5689a05a144cb428
SHA16d4b617e2df764dfd55d8cd2df0d56450da4fc4a
SHA25670a78b41937f9bd84992393f7229d681d785b68186c9a9c4dddbcb01a030b4cd
SHA512dbb2e1a372826144e11a9040002ec2f8310e58816c5aa0789546fea97c59c5c4e9570acdade645a3d8da7b36562abe2d8b9b61e79f7e9c38d24dc4806a018997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822c813248df788a6fc6e64d19cd4d82
SHA13e1dcc82009748eb4f91fdafcb07a7fbbfb8c02e
SHA2568c15c5ec3724b307620504b66a3ca92205399de13a88bd76b6ad5ca42624b4c3
SHA512460efbc084f521fce0658ce813045d25da7880f92a999ee91064f2e4d305cfbfeedd0cf7038a776be647298a6d3ee9d81274d498bc9135eae2bf511cfc0a8278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f28cd5db3418b4746a0337b56e566f2
SHA1d409c4dc7fec3dbf69875c38ad1bf6987f210e76
SHA2565c9069aef28991a732b817f57b1e698a3a178916de00df75bc5f86e75acb4420
SHA51268b55a2ec088a60ac108d6ad2428a0c6208084527304d4ab19265b01a8600a17301534722cd747473c694e6162be6c490a9f5d00e7b0f82170dcbbc11d191218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b54c64468d3380b24e103d354eba3e
SHA17232cfce351c67f8c4c24ba4ff203ab079ae452a
SHA256e29833b9de55f9b531b86818959ada24ee797b5ba1b966fdc3e4d3f8a3585489
SHA5124113925deb2a6fc9e9cc29640d956ae442f17cb5ce269d134b80eafc974bc4986ae941e473ae72de09df0dabfd97aa7993213551e862397c8248490577238ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a76dd807ad5e7b69c1d7c87e2bd3949
SHA194893fdd47a76ef43d118efb1271666244ce916f
SHA25643c8ecdb316cb8b6bb1da18e8d313d8937e60baccf33ae69eaacab59e5f67e65
SHA512fd0742307e37662670751cd1203faf0c3bcb002b8829765ec55ab211bd3f6613cdd8cec9828e86a4a15c40258b463a110a3e9ffbfbc291163bff7db2c405aa80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aac5ed2b19b62b28e1f7ce28d3c3139
SHA1896a6fca32dc6c612024f194fd74d88e65f4effd
SHA256a8e8097c6e09e30191f13595d5b1a1728251279885ae32d47633b948ad27b2c5
SHA512bf8943602b085e32f812b883687cd2bcc159452bd728c77fe3b93559fc1ecf275a4b5feccfe6808a056174a93c0c2a189b966e32e4d409dd0aa0a99b34006ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e0003d41ae7f1ae8cb76bec1e5ad4f6
SHA17a2392c3638227c06a6ca2f56e90ebe31e66f4a7
SHA256eb4e5552f0078f010a6dd11e9f57dbd796fa1548275a3cddccf9c7d5e852844f
SHA5127eb1eba0b6fabbbd29d1f76f502c509fca7713d16ba24371b453f606066349f8854a9858a9279833c1080c48ea1b806f0d19062c237c1e6eb5337db02e91e2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054b5cdea272b63acef65b654b9216aa
SHA176f5abc6f8d8f4ea5d8624ceec70596ef6a1a8a1
SHA2568bb013e9a0a0af06dc7e99a6f538c0c1caf9e6268c1abb8fed23842ef2f48eb2
SHA5123f09b12aa0a3d88e2c2c7e8e179f15dd7b2dfa4131ce54fe1b77f2fc82d7188fe2ddb5d91e261b229d36d48b04a491dd0944849f0d6b642d20efabb72571f57f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8007060b70c5346fca58e29a4b22fe
SHA128d976797a065087cd26bce188a015e0c3a6de1d
SHA256ddbb7480babcc1666c42e90d00054aa74d490180acb79a78539bf88b9c646cda
SHA512d0628914593127c14f1370b72c5e59be83cf561ae52060df047ade703be1d0864e051b3e7d195b181499fc2ea008f864be46b39a939e1548145eeadf6bf6efa8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b