Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
eab8c672bd27c3a946d9055936b6667c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab8c672bd27c3a946d9055936b6667c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab8c672bd27c3a946d9055936b6667c_JaffaCakes118.html
-
Size
77KB
-
MD5
eab8c672bd27c3a946d9055936b6667c
-
SHA1
3ef1d29e39343b5e6726a500cdcf584aa271c0a3
-
SHA256
4633c410e5ab4bd9e423ce9e0fcaca8e8d839316f36811b750ca8b15dddb0673
-
SHA512
ff9e8d810dde3599c7c1ed6d95c2d7e3b2083e8078efa6f4358bbbdf8027dd1aee1fb3adb6a2c546c7cab722304fec52399f34261c05ccaa0bc7b12fb1cf5469
-
SSDEEP
768:Zcd9QZBC7mOdMFRpC5I9nC40CDRGcCRCPd:gQZBCCOdU0IxC06RCPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000009f6f9a6fdb48017ecc536769de309b315688238cf8d781673eb8e5019befd638000000000e8000000002000020000000ceff4fed08ac44060585498bd47b5f4bb8e36f3456adf6d81240ba103fa810642000000061c71a06ded38672b4f6489b4a9ac60c626e02dca48cd74fb4e11a275b2f779340000000bc8e59a7391b1e14ef3206eb602ea20de042925f0801c3458204313298dd28e62e7e419d9a2c5c4644068aa0dbdafdb5b592a1f30c3beab0feb742ba305b9778 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887653" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cc1dad590adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D60A9AD1-764C-11EF-BA16-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2612 iexplore.exe 2612 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 3024 2612 iexplore.exe 30 PID 2612 wrote to memory of 3024 2612 iexplore.exe 30 PID 2612 wrote to memory of 3024 2612 iexplore.exe 30 PID 2612 wrote to memory of 3024 2612 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab8c672bd27c3a946d9055936b6667c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566bd37a1386be2dcb7ce5a824c29cc17
SHA1344f1c424129a4d9801190b233bdca2eef9a95d2
SHA256dbd0dc3c2ae288162e7f63fb355a6a1512a8a080d4b39c3cbef189643610954d
SHA512ccbbf1f32e56e3a711de5082b3c930f3054619900bd451ec80e143cf05afe84f0e8ca9983076d7bd550532ef6a6794d127ceda493fa9e99fc84a85bf565fa7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6a282aba21ca859b5255bc29dbef2e
SHA1d4c9ae874fa2ccc53bf112770855489317937051
SHA256f18125af4a34b8f76c6ac23e02a1f8c255fdcc0d8cabe33ada4418b855e330a4
SHA51201157613997ea60b5aaaf27a964e807293c6d6f585081ff7b7bcf4aa89cd66427e54e007713b974a81102072b28d345c28baab486e0f85718cbe0160181453f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d99b23ec8eb91aae37a273f484ac3d11
SHA13714cc803d9937960523bb67ce0c3e5daf9b90d5
SHA2566397a0f885452a4d3e0edfc58d1ca67ff41f5f3c0a00dd05ed32e1f52ea89480
SHA5122cba28d0a973f708fd463de6ca0ecc50cd1b5e7017b064243d0cf4d7b09cc4afccd1cebd264f3236c0503337128327dfdc8d22fe408737a8414809459166fcec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538d4392085190c03adb62d51c46fb34
SHA1e5a12549ddc7f8346726dcf258b1b0f8919473ad
SHA256f0857c2f5c3312c2d6792c7e26b1b12a82ed818574078f966a8ebae87e75c920
SHA51200f02bdcd6f2d6ddb10aae8114d9f5fa2993f7a89d124373c10d1b53431e778bd23bb5e9d9dc4811622eebdaa0de1b215000b70bdfe8e6b78362257220bd3f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92b94adca301307c5312ab8d4e29baf
SHA1053503e28d97ba2b18913f1d353911f6cb612887
SHA2566dcca58f406390bd4102baa2f233b188f0b3434a085dbbf7afd3f4c174778d4f
SHA512050a3d986fd074e35e06dfcfa99840ec33827259f8589e6d0032398118dda7a4266ab9a79604c7de71ea2aa32558d2aefbd58d948fabd54e25dac4eea6617789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96c819be88d9809ca0bf76fa19af2d7
SHA1e543852563f5c99d8da4b6277922ec4ac9023346
SHA2565724f4ff443a080141b2b8b3c860d95e7c6bbb8229b3bff332a2ffaa5e2423c7
SHA5125794aaf15d23d3eee1c43872f98e426186bb8b93aab6578afaedf912be581c983c203a76bcd535f64f43673ac0b7a831cff74d6f8e9ecdfe073b95acb8018b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869cd256f5144a5d3f0da857c715d1db
SHA155624d082b2d423a0c7d18aa18e99f20ec93f92c
SHA256cce969335b052512c67b93dc748523166c884126f48a58d39bc65aa2c7ffb8a9
SHA512b687d4fa7b07f61677adea4bd3bba9429da79963469c8e3c62c83e5175f330b95d1ea27b6dc5be964c56744b68a33c66fa3fc989f466913eaa0b6096c3480574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed42b001f9cad6b2324ef166ae08014c
SHA1ef01f97b95ac2c48234f07163eb0219945fbce23
SHA256da29db39c2ea97b3f811b3ca24319833d49c3d369b0cb35fa478dc78db9a36c4
SHA512f74ae557596eaa839a5735c169d805f70cf97c3adc84823ba9c3bd2a00f916b4ef2671eb9665f2fe1aa935ff9c52cfa2ba3e3537152759f82201c1df48ae74cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c126f8fc3a4095b2a6ba6fbfd291e31a
SHA16a8a276bb36d98e4fd3e9e78316a631973efe853
SHA2564411457d54afcf2abe03eb27602524fd0c3ef17e008ae071aee4d9310288649b
SHA5127c92e6ebd2904e456780645d7f25ac559cea7e081b8ce3d4e8573f29a98eb0acc651723497d866825123c06db00a3955935856e22a4dabb6f2c1a943dbcdea55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306d436ca0b5fe898fbba19e685f4ba2
SHA1e4353db048410709519825708b83d763131e22a8
SHA2563092fa8b962e578ee89202107f27d7b7de024fd3e82ef15a01f6122b3a4976a9
SHA512fa18c778bd20adfbce42741306e04537aaefd529c946f73aaaf4f4e3e2d34518a75b220e7e51340085229cda97e8ac1b492033edfaa0c21a83167a7eff7d5d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8c8a229bd8151f982fdf818297523ff
SHA1dc30fc9cb4bbb868f6f1f2572ff71dc3b68bc565
SHA256049ca71db8b63c401ef350c88fca5809154dddb931886271239185f99e7fb10d
SHA5126c1b047c26ef1eb0fe49317ce2cdcb67d782e49ff7dd764c5f09bbe617bd0a350d5808b50f3adacfd992478bf69001030995fa348c47e626d767e1c88d4f9ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54010be34729a73c3de0dec57f46f97ea
SHA15753ed9a6245c94528061603c9427c346c7aea7d
SHA256c61dbffb80809168117f4f65230190082f7d38a2b705027357b722f573b06295
SHA512ffec9e269d37efa9afbd961e483cf4e88a37582a47a8b868f356bd41f7e79c6431d54079f54628fe2939d568b590c25ab17ae248846417be27d4002fefd102b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93ccf3471867fe3157c9e20aeaf11d1
SHA1c9d81e12d5aa0cd9132d58000539662975e4d508
SHA25657a4d508e6454e6c14d44ec0874ed2d16a3c5a0987d11c1d24bda4bd114418c6
SHA51265b14faa1a8f07e7c41ad71f48b59605226f6de2094a0b8470fd4f6045f23601af7a83d010c932b7df06781ddee8aa03ed5f741c50239d2b8c9d8a7f450f4787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892afe5e009d2b8bc1e3f39c27795e54
SHA1447550149d510d672d3dd37999a5f69064c500bf
SHA256ccdeee4ead9a32203b5794b4c8e9885e91a9a789152dfb21fe5a4e09beca0a68
SHA51291b063fb404a9d6fc958166fbffc3f0e894ec068a564c46a0f81f9c4481f7931700210fabf36585c704149532e8a0234198930de18e06f7bc97592356b3f6243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c714bd30beb99136ec7b3b6dca13a4f9
SHA1f3782ba3427bbd8af60dbd10a02679f135d1597a
SHA256faf8c0df6e1c00a62c0331f0e34fb3b21157b76012e9650a681db33050b82251
SHA512282814c68465bc7314eab4812adf4e5921674d3c8da0e89bf3ec514302d8fdcfdf93f46eedbde27e8f5fc42d618d5cc12703100e718f63f8bda01e2c1421796d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b7cb3e760fe9db98d361a60f7d7b63
SHA11ec6222a961a91aa3d1e21d262ca35baec1f9f38
SHA2566b97f01e284695091de38af526297d8888dcde776ddac23ed183f167e54acfcf
SHA512517a10ed622d78320d60f4dec31dd4809ed24f259f3e21d139e4e0d468dad092c55afeec5e82fa1c8c36243b6fa1a7220c701a56233a22ed7b00c57779754d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f9f90c4f17dc533c5bcc7f2a61544b
SHA15792c59661250fa29a386992b5fdf52a88f314fd
SHA2561dbff85e9d8dc1bf751934a8a0a83e8249e5eb2b0423f54b06ba80d2e294cf6e
SHA512fcb7c6c3f379892c13ef49f97d5b0ce96db92857c63d164ab2dc3cab4f4d081653e7ce491488d819f689857c9d6ff9e3802cc191ef08021576242717033b30a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b15cc5b3be0c612a45e6a2877915a33
SHA193a7f3bba029d28cb317774526a414c2498285bd
SHA256cfb453a953a6eaa0765a2aeb0953e0a64c72b0a37ce5260e6341de9cd0a3f972
SHA512bf45b2382fb7526abd790d969137da5c81c458acc8d43ab7cc5ec8b211e4a78a17bd057e1b16843b32ec60c9f08ecb4aa384b4b8dd53b7c949a32b9f85814913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b02b0de0a1de9ea721b6dfeea2a340b
SHA166ecb36531f89a153b344d69f0927d6769db6b92
SHA256478ce6538b5d96c49b8b24d0fba07c5658ced33dcdb9c399a9e9b7745f975f7a
SHA5125444abf42009ba551a2a1eecd7a7bf277e8050721ecc72dc9fd26f261d0dddb5412ea9ce23e76e9286f3061385ff28e0d6c31aa2b962d777b896d059980d79a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b