Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
eab785dec72ed0dda8df7259de0120c8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eab785dec72ed0dda8df7259de0120c8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab785dec72ed0dda8df7259de0120c8_JaffaCakes118.html
-
Size
1KB
-
MD5
eab785dec72ed0dda8df7259de0120c8
-
SHA1
9f4f12eb47f9fcb855d1d31dd595285584a62f54
-
SHA256
1a738c38c589d16b5600fc889679b2309e105dcc481d6f7f091fee8d93f7fa0a
-
SHA512
2b8a3302723081118c07dbf842e079fa0c337b91ef76f0bb5fd5c925c61a52d93b7ebb4ee39a9e15e5ce8dc9a741cb08bf1e16254d829d7d91baca42d496b5f0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000010e0b8458fff59db758d965bb4a610493d4daa25baffe99dc5591ae509d46947000000000e80000000020000200000004ee61a95d62a532041d4885a8fbf201ae8fe73baa22f88dc3b0a226e2db0aedd200000003baf0da4139ab6e08cea41a1e4fd94a6e478c29f1adfb74ac231c9fbbe652cfe40000000a5c59d27a4cbd1237aa55349aee53c0ec4bf8b26427004d8ab07d64ec7817148d8298b476e2f5f53a6d95e8aa5b6766ac91f60cc7d75bbf742acfcd2e841ab83 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79AC45E1-764C-11EF-B856-666B6675A85F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700a0d5b590adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE 1376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1376 2380 iexplore.exe 29 PID 2380 wrote to memory of 1376 2380 iexplore.exe 29 PID 2380 wrote to memory of 1376 2380 iexplore.exe 29 PID 2380 wrote to memory of 1376 2380 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab785dec72ed0dda8df7259de0120c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871edb95c636b99f53dcb79761e4b8c3
SHA16618c9e510eeeb046c163a1dd0b088e83d12c7c1
SHA256f9d2eae9cbca104391991edacde76590dc94a93e9c6c78f8de40ce4f81b12b8a
SHA512f60be18712f12463d96f41be414a57e7642120ed6dba030ddaf28aff979493201d414e6335797ba2cfd0e867fe6f80a338eac3f42aefd3b7f98a27a95e1d71c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84ca60eb4c15a1be83af85902258a3e
SHA16c7eaca2591a0f9df4db431e8cedddb015f7eb0d
SHA2563ea528a266c0c00b65180127aa25c4441c29b385cb932961409d1bd0ec7c13be
SHA51243ac3250b4016b5790c8a022d910f0bdbc74bca87252d18481d5aebadb15cfa8de000781990c416fccb3fa039b2a57acf876000052775275a6eee4629772a049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0148d219a06b93d170b494789430024
SHA187e487bc18795a87d8ba527afd073f21126faee1
SHA2567a8ec2ee0d26e23c5b1b6575fec1360766be42106923429e9b3c155ca45fac52
SHA512c89773360a045878b4bfafe23e3167cf6db50988511eb5ba20969776ec3cb87202346957fa395493215bdffc3d913f234728cfad9aeb9d49f7636fd18448f3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e96efd9c1874084b4abd9379279f462
SHA14a74b1bb6273557dd6e620e52b9b0f936ac8fb39
SHA256fcd2bf0c617136f63050eb821fefa4d6b7fb46a250bce03ba914614e5467a6a4
SHA51201c453d1abcf0b360616de99f9ba9dcbd9e1f7ce89d4837eb0fc3fdbcda760df866c4049683b16cb5dc80e1dffaba7b38793c9af425d8701d4b0bfc4b817255a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f07ad457f2567eed4633dbba77fabb8
SHA1fc5d225715f74aa41d45bbb6226628b81df80eb7
SHA2567c2e80238d7af9a64852acd2d89247b1c79d712d4e030f4439e07ba5c29ac82b
SHA51210dd7388094975d5b8785cac3ffc0d7b98b4a6dddf868b4a8c78fde422c85a16d008ff8fc40421b2f3ab726b8037a414c2a0d04d7918490fc9f3cee3888b5bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8ad3747c2a585e739ec88f2acef8c8
SHA129544f1b5c4d2d510d9f02bbdeaea92dba9c4cc4
SHA256991ea10f3cdda05d6bc9955e93f24a3eece9a7c1597660f3e92700bfea16bc92
SHA5126897aa11152da46a4aa70706a99bcfbd3525616d9581e53fb7d91f07af9ac53388c88171830abcd95b5dd0b68e977009a87d420fdbcd820099fa1b5e929cdd3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407d195caf239e5498cd41648ad532ba
SHA179c0ac2d9445f7fe42d970d9793bc22ab79d3c53
SHA2566e5a9db92163149c14c0484dfa0e548229eade4dd8ab108a92e28772dc334990
SHA512de84fdea272077f38cdba6be4f4f1444473ab1d401d061a9dabb547f5be7559470884742501b82ccc80b6941f9b3329816c5e8414da85e123f4b6d819e5015b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52256679085569e6c2d1199b5713f0ce8
SHA167a8ae35940e133521cb102c4d440573edefb58a
SHA256e1fcf6c6f52f3273421153e41bd3208d87d7b85c71f6f8f07f16012fc6f12405
SHA512c48402d06f984541f1be795eaf0aeb87d253b3ef9da9b74c73c7d61437a58cd81a641741ba492ed6c658646df7f43766db8926f0fc88d6ca84a3ff5249177fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730a403bdf6c7fb965b3ab8ea94f06e5
SHA13107cd4991374a59e6648f9297e54ad48158f593
SHA2566ed5f43f5f48e8534cc916b64c568a16a87706b6839fb10cb770b3b0f4927319
SHA5120448513ff0fcddd0ef1c7b4336e6bab035cefabc1b61ea95ce408d87454709f6558afc0d631f5f113666a11f599f8accc689272c7d6e600f5a55703e125acaba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5747b7d70a6da39eb74c3279f5796f55b
SHA10c4b727e5100994d3cf0fabe6a8a91d5a666a59d
SHA25685c9ec67971619e7e033ce0a897e697a7c68da0017ac3d5854f69057e8e248e0
SHA512bae2ea413245bb390ea42f4f74205a96f24fb884945906e67329d729da2f750382522fe68cbc20acfc6904e31280a19709c519e0669ccb9c6babec5c15952692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5911e452307ceb08407fdc18654713417
SHA136bd99d8657d9e366cc01bd95f0544ed5ccdf7d8
SHA256523a6641f28a0623f77b95493f4f0ee9f619ebd59ebc0f612209d395d0ce5191
SHA512092a9e9570617d247163e9a4eed54e0189e263c069127eba3d6378274f9fcf5da2caf4256a33a102190d3277ca8379ab0dcaa9c92f36c18be00eacbe097d93c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5265111a1b81214a4a380b2c1866f2a84
SHA161c32600877172d1296a00af94118878b14b8d27
SHA2567e2f479d9c8d810872e5c195d8b724050422a4b45bfb25efaf4fd34bbc9cb75e
SHA51279b7a7dedf34a86be22cea85bc32f0fb082d7265bec20e033a6f85fb63daeadd1ac25a6a414fb623f2cdb02f9152575896d5d18fb8fdc6a3bcdee17f763da934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551dd2713157926352eb8b9aab50cf2ca
SHA1bb39615ddf1d58514c1e60aed49341f9cca5d334
SHA256633e0c7e08709eb523f7700ddac88bee6d94145612ee80110a679ef9875904e9
SHA512c892020e26768d09235200eba5b0b1db4c2806263b7f61396c297d73f9529a58777b54791d2f12f5ab4fd1a268c15b7de306145a08e53e29239b26918738cf7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125efff7a6e10f7de3dda7ef9428d2b1
SHA1c5aa17bf9f6d9a94bdea987e86efe1dd8fd88a21
SHA25672309dd09f025bb925a6f6d3115b8c0eea8a18aeebc18646c230b87735a65c7c
SHA512f95a3823477a2babc64762e16f6e4e4186eda62e22789564b7783e98c8311ecddbce54bb734dd00642157fc737d5f79b171f295b156eb9dffd68987de9cfc804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52310a49cf3a8c41d4e682d134193c60b
SHA111ed9cb28f798e3a304430b04afb0da8fcec914c
SHA25681556e8685fe03581bdb7e5c956d9727a7c8cdda232dffeaf2917b925989172d
SHA51244e76ad999b4aea10f0ed01278b8441b5327b2cc13018bbcd68421cbe4c348ca6b42b49c70265b27b129303229bc3c581de3be03a92acd99fdde33781226a74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8df3253c207043d30ac5cbdcb44427f
SHA1682c57122299d699f280d636e84de161d6b7797f
SHA25605d887538b723ae399e8c083d54ca9dca84dcc7d2976824be0afd5b7eb403f83
SHA51208a2d392935cb84573d5be8b163f72e0957862bb7da104733d533fdc2bbc6532503b651c0f771f20f59bbb81cb2dc541cc91fe1747de13a3fe50095719c3ca1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3343f95a90d647c5082d0b674673ee
SHA14d0c3a87054f25d4831d8c85c1eaa16f16310bfb
SHA25656754c4a24b51517cb7e4e9ffadeb9f19eaa8f8f0f004e3f2a4c309e1de13346
SHA5125037873bd3d2021f9d0c15cde3e13f3ee59e8d992197ed4b24104029d1d99053cd472912edb8ffd85b1b55284d18faf6d867a325857b64899f0efbc4ac512221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51706fbf89cf7f6ffa638047b3d8e4e26
SHA17270db32f39ac25192e17fc2dcf74b812f5152bc
SHA2568befc0813132344256fd925392e9edf255b143ed017e66a5f606eb221bca4e73
SHA512e0d4dbd591b1e9c8707295cd012ab18ab3d22284bee063872eb70f51e4f946aaec554895f9c203ce562b7b52651f0ea0e7e22e2decb3861042faad3032eb3447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538041e275cb8bdb57870fc3801737496
SHA158140cefb3c0fe8416ebe4f55c6861fe43d73030
SHA256d7de2dfb91e595405a36fc439b866671afec9f61530a4aa943bd5deb1cddeb5a
SHA51233e7493bbfd91fdd9c698a69fe151fa0e799df76555013954a612dab5989819c1e91bbd0d494fac199550d0c496cde4fda083b941453d3edfdf5ec971c54956f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b