Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
eab8f239f467185af0e84bae1744231f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab8f239f467185af0e84bae1744231f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab8f239f467185af0e84bae1744231f_JaffaCakes118.html
-
Size
44KB
-
MD5
eab8f239f467185af0e84bae1744231f
-
SHA1
e7996d87e7a485378db1a9522dbecf124eada69f
-
SHA256
86738c61d20c0cf333f8dccac8cf135f9616159c026a6be02a5d41561444ab83
-
SHA512
1b68a84aa7ce840889a7aa9d39492daa14cb4171b562cea060ff9d4444c456df1249cf5245900600e8809316525f4bc86dcefcab00198304376bce2f5d76305c
-
SSDEEP
768:Wb0fQw8pdXJgxW6hPDqxb7Sc5F8aHTYxsvvqPU3nSvta:Wb0fQw8pdXCxnhi7Sc5FtusvvqPU3Sv0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4614251-764C-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000acc828b57fcc552597444713e52e900cb9327afdb35e35b6b9ce491605fe250e000000000e800000000200002000000096f84dacfc34b74b437d77fe7df6ce563bfd412501866db1f89f08e2a2b6550720000000373255406d212c8da56ebf11f11cf0c4331962e812498c4b55e6f81cf8a5cb5640000000df1a18566824ef9ea3bf548426910a391d581f0aa76b103c873076dc49da33f7e059f798761afe996df41ba0b195b6086a944cdcbeb89aa15bef3c669826235b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1018f7b8590adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887676" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 320 IEXPLORE.EXE 320 IEXPLORE.EXE 320 IEXPLORE.EXE 320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab8f239f467185af0e84bae1744231f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bb437582597a81970bd1366cbb185d0
SHA173107b94efa2cb38b084a17e09de41e7cf31f3a0
SHA25691eb9e093c5912fd9a98f2e7857478ff0188c781e5ee92a46b6bc5d6a9d4a47d
SHA512dc38ab8179d1ca487ffa661fce52a24b0a90d6bc4d76c4cc509487004fcf02c0d8e78fe3505a3f296a7d60b731ef3546dfcc04c35248d8c98aa081081abe8fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f92dddf86e8e8842e98ba9d9d2a7ed
SHA1b5cf65335eafc0a1af809942891e9f285d3bcb4e
SHA25645d579fe07d0e053f1c56cd33eef154a29666ccb439fc5f804015ae52eb46db7
SHA51209452164d92191f8738cc964739dc3eeda5ad49f2077beb30b7083df8f091aec3761530f9426ccff61ecab4b81448e2152c5ba0ee38b0928109a905e68a60634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56713a24cc0ee073b5460e9e323b8ae01
SHA179e68c3a22067823d07b8be85099721168412930
SHA256865506df2626ec3e8a6419db3bf869c135590fd56e139e2f7bb0be4a8157c735
SHA5123513746aee1cbd5e37b418b055c32a810cb7157cb8292482fb751e48d89b5d14070772750dbec730bc536459539ccbb9d625c02e4c33f05c0225b6e6cc082ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50febbc827b0116f6d61fc5e8b889cd1f
SHA12d0b65a486954a308bbfb54e5879b89836626b30
SHA2567c68467783d29addce708226a629ed9e9335f43ef1c999e29dc8d8cd774a35c9
SHA512c276e7487eb09a4776850f2e3383a175e46e1ecef38bbce2d2c32737af05a18efc56e05b1d44997bcb893b3accb9c9adf6b2d964807fe07ff1984bf207438e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd125b725f8d652b4b73dbbe417961e
SHA1755baeafef974eeef40b9264a0e7a5827480e24c
SHA256c34d040ba68a215aa4053e922182f9f440a279d7bb0c85912de4b5e41b80c537
SHA51225d6fdbfaa707aa45f0317294028a7231c6594065663b7391fbf931a1756db96f164e8c61e17f9ace93748abe50b0ab11510d7cfd3ad56aa7f5cb5c1468d4776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54bd3d5d746694c176d74e1ab74d72b
SHA1c4dd3d024b39edd82546f3d750a6b9fc0d15ed3c
SHA2565e0f9ad95e37b003b75dce195cf5bbd0f2e3ed723e6bb46f551cdda3f0dcd6ef
SHA5124ef3513e274650b1e9ce11d804ec7eb4ab67a532747a79321b1ba5a7b3ebfe5fc9051058cb6c302fa3a5518997233ffc56742c5907e3b7fe9c88291921e96879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5145c039b5e1fdf73fc3f3426667d4e26
SHA1d1f4a1622903215ca1ccc4584bea8fff6f2123fd
SHA25675fe4f32bf623192209b3762c18c3043b6801bd4d1fdfa57672aa8b863d2fd4f
SHA5123e9fb025cb342e511271a25a058cf74a44014775aadc9afa69b8bbc56449367eca90a8e5ecd38d0a1adabaad48ce16e18c7cbb13a0bf98a0dd370a5f28fb8798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5281b45fe19846d5826ea58594306a55a
SHA1882d985eb8592dd08e29a83bfafc833eaa2723e8
SHA256215839b245daa39ac65bbcea47767f510980de4eb05ee8f3fbe0bb79979ada40
SHA512311b76476149388c2ce222957897f4f1dd23d999073a0727bd98f9d7134ad99b4c2092d0ddee093adfb0deb88b1e8053854235b245e487eb9602ae18f531c560
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870845431790ec3af2479a0ac8e3a52e
SHA176431d61cb756bba06b804119ce474a99a5bee38
SHA2561ae23775c8ba0c596c570f2c2c9f3c7a02f1bbef22cf7df8c2d50c5ba62f2bfd
SHA512aed20a03ef16821cfbd171d38635898762277eec40436ebfe68c398e76cd2f286b43da097ce4d394a830713b2e7cd7bc8554e383f20204c78ebf406cddc5b0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5587cb208bbbd6ecdfee6a2ee8221f633
SHA1bbc414921f0d5db389ed077c6cad754914284221
SHA2565745a429a42390786a5048b4c2c2962f20c1054e7305ae7def1d046428b54046
SHA512a46bd2c0900f99989f35ed0fe57a5a9bfdaf0426351f6d98bfa0a76c5080eb231c2fc48119ff6e88f44e95756d83b823ade49676d9fec0ac4b3c4762cf99a4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfba54f96e7c7894f5806f10e23d87d4
SHA1916a8b012ff34034a886ff9b99e834f0a4534216
SHA256f670ea31fc743a5cfd73ef863f5642ba4ca1a6c34fa62ce9b7feb197ad0c2195
SHA51286c1b397f8297e2e85104d2adc9f81e8361f3c11b59a329ddf6eb816186c93025e802db0eebbdecc780a30f812b0271d65c2e2e1f8a66cc4bd0915a8e83121e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6b45e0ecf63fffc9c79d9b4a2280ad
SHA1be8b419ca77a4365e03e8810584fa0dfc7cc382d
SHA2560f32e500fd5961358915ffc2e9957b992608f9f56048cad79c985c4991c0a6a5
SHA51292404a4811f7ff3d0483ae8ad695b628cbab555eb11e18701ce5ca3cc46d09c579506371cda2dc375b2d2784036c18b5a984f8700aba5d1aeff616c54884cc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef487fba20c5f6659af9564a71b533b0
SHA1861f6961cb5e4e580a9a5572f622ea3988e5f665
SHA256c02a75cbd61c4974a5da624264e77e25172065186df92d2a33bd1627ee75b192
SHA512ff978885bf79c98f451384dcc2a2e953caf42d59fdec238145e127390a40ca5c3f92742ec289c89d0ded6f8ae0c70902fb80c1cca9840b9a6b2fd5c0734f918c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f598f739d1f49d8f75e8bb8095a6bac
SHA187c28a63b127f84bdc5e0eb5099d0e426bed5294
SHA25613c6b7e361590f939a539a88731a301746b8bc533e05934efbe8b5d4b1ea1e13
SHA512b883f571033ca79816b1a9864539611885bc5e281c15c6b8a2f43b3086ba752180f282a80295a2e1eb1bf2005a4b3ae7690985869a407239a62050e79bf62f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d7b75a55554f71213f5f6c238df0d9f
SHA12b1dd93fd68fc700fd01f749a043441a45da2a1a
SHA256d6347a001e47129938b5b44fab5d973b969939037ebd48a5ba0e3793248731af
SHA512181635009e6ba6c7786b8bd9e9667eadf8ed4d1464f736ac8aae2e01f28fec67feac39930ca86ffce93779211d9469a0ffa3b80e348f3f0753a0ce70ac77ae7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52973ec99930987c0e4e034b649534186
SHA1ed59b8f4f2611c572828a64d738aa407ded937f8
SHA256bdbef7e69fe1d37671e7d6a1abeb47643645347330bcc060c87ed5045a3c45c2
SHA5129981a60ddc859ed29c4e5b5e2b61c8259310c43ff0a0062e8e61b7498c6d12b810b5c7f13fdbf03d9dd9367a0121dbca268e822eb59d213b8c5da5c598177134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589378b079580051f197fa7a25e69293
SHA10f2b334c3cb13a0fe5912d53e5dd7223b6b9adca
SHA256598302b068b875f52cc4fdc754950f7f946e5658684b14f1fc97b2e3909c4670
SHA5128049a6894880cb90c844b16087d31402e56ec5170c7ff118a0b8ae78816322557b19cd7ea12ff5e20112a062e5748239a6854d5f1dfa73ea36e584ea2a315071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c790acb7fd7634504d6ac0cec4a7375b
SHA1d9c18bf9369b65451436293459c5c51958d591b7
SHA256ddc6b31c7a98b795e18ad7408242bbfa38f793f5584aed77ca429ffb906b1d16
SHA512b2790417f745ee01baf259983d4dccc33b889bffe6b547e4a4d58a5f94046fd74609d308f4dcbcc272f10c28eda139cedd840e5214143e68ca54d7610151a1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5595e4842b938830aa58e8347756faa8b
SHA11898f828c7f29efcee6805fa81042c0b3001e801
SHA256b95aac46eb4af5cf03908458a293d4f9886b0545f612f3e4cf8056f264d11af4
SHA5127ea4188b2d0c92de8f71c117fc06e2d09de4b821040888996886d13a45387f5bb2ab551a29a520c23a16e540d0fff3e685e3aff3c1a192d5a02306d24d4425e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b